• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 2,667
Next 10 →

Weak Ordering -- A New Definition

by Sarita V. Adve, Mark D. Hill , 1990
"... A memory model for a shared memory, multiprocessor commonly and often implicitly assumed by programmers is that of sequential consistency. This model guarantees that all memory accesses will appear to execute atomically and in program order. An alternative model, weak ordering, offers greater perfor ..."
Abstract - Cited by 260 (14 self) - Add to MetaCart
performance potential. Weak ordering was first defined by Dubois, Scheurich and Briggs in terms of a set of rules for hardware that have to be made visible to software. The central hypothesis of this work is that programmers prefer to reason about sequentially consistent memory, rather than having to think

A rational analysis of the selection task as optimal data selection

by Mike Oaksford, Nick Chater - 67 – 215535 Deliverable 4.1 , 1994
"... Human reasoning in hypothesis-testing tasks like Wason's (1966, 1968) selection task has been depicted as prone to systematic biases. However, performance on this task has been assessed against a now outmoded falsificationist philosophy of science. Therefore, the experimental data is reassessed ..."
Abstract - Cited by 247 (16 self) - Add to MetaCart
Human reasoning in hypothesis-testing tasks like Wason's (1966, 1968) selection task has been depicted as prone to systematic biases. However, performance on this task has been assessed against a now outmoded falsificationist philosophy of science. Therefore, the experimental data

Synaptic plasticity and memory: an evaluation of the hypothesis.

by S J Martin , P D Grimwood , R G M Morris - Annu. Rev. Neurosci., , 2000
"... Abstract Changing the strength of connections between neurons is widely assumed to be the mechanism by which memory traces are encoded and stored in the central nervous system. In its most general form, the synaptic plasticity and memory hypothesis states that "activity-dependent synaptic plas ..."
Abstract - Cited by 136 (5 self) - Add to MetaCart
Abstract Changing the strength of connections between neurons is widely assumed to be the mechanism by which memory traces are encoded and stored in the central nervous system. In its most general form, the synaptic plasticity and memory hypothesis states that "activity-dependent synaptic

Image Change Detection Algorithms: A Systematic Survey

by Richard J. Radke, Srinivas Andra, Omar Al-Kofahi, Badrinath Roysam - IEEE Transactions on Image Processing , 2005
"... Detecting regions of change in multiple images of the same scene taken at different times is of widespread interest due to a large number of applications in diverse disciplines, including remote sensing, surveillance, medical diagnosis and treatment, civil infrastructure, and underwater sensing. T ..."
Abstract - Cited by 236 (3 self) - Add to MetaCart
. This paper presents a systematic survey of the common processing steps and core decision rules in modern change detection algorithms, including significance and hypothesis testing, predictive models, the shading model, and background modeling. We also discuss important preprocessing methods, approaches

Automatic vigilance: the attention-grabbing power of negative social information

by Felicia Pratto, Oliver P. John - Journal of Personality and Social Psychology , 1991
"... One of the functions of automatic stimulus evaluation is to direct attention toward events that may have undesirable consequences for the perceiver's well-being. To test whether attentional resources are automatically directed away from an attended task to undesirable stimuli, Ss named the colo ..."
Abstract - Cited by 232 (2 self) - Add to MetaCart
for undesirable traits, as predicted by the automatic vigilance (but not a perceptual defense) hypothe-sis. In Experiment 3, a diagnosticity (or base-rate) explanation of the vigilance effect was ruled out. The implications for deliberate processing in person perception and stereotyping are discussed. There is a

The ‘‘shared manifold’’ hypothesis: from mirror neurons to empathy

by Vittorio Gallese, I Introduction - Journal of Consciousness Studies , 2001
"... We are social animals. We share this feature with many other species. A complexity and sophistication that we do not observe among ants, bees or wolves, however, characteristically define the social life of primates. This complexity and sophistication is epitomized at its highest level by the social ..."
Abstract - Cited by 129 (16 self) - Add to MetaCart
by the social rules our conduct in everyday life is supposed

An inference rule for hypothesis generation

by Robert Demolombe - In Proceedings of the Twelfth International Conference on Artificial Intelligence , 1991
"... There are many new application fields for automated deduction where we have to apply abductive reasoning. In these applications we have to generate consequences of a given theory having some appropriate properties. In particular we consider the case where we have to generate the clauses containing i ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
instances of a given literal L. The negation of the other literals in such clauses are hypothesis allowing to derive L. In this paper we present an inference rule, called L-inference, which was designed in order to derive those clauses, and a L-strategy. The L-inference rule is a sort of Input

Hypothesis-driven Constructive Induction in AQ17: A Method and Experiments

by Janusz Wnek, Ryszard S. Micbalski , 1992
"... This paper presents a method for constructive induction in which new problem-relevant attributes are generated by analyzing consecutively created inductive hypotheses. The method starts by creating a set of rules from given examples using the AQ algorithm. These rules are then evaluated according to ..."
Abstract - Cited by 117 (33 self) - Add to MetaCart
This paper presents a method for constructive induction in which new problem-relevant attributes are generated by analyzing consecutively created inductive hypotheses. The method starts by creating a set of rules from given examples using the AQ algorithm. These rules are then evaluated according

An Active Testing Model for Tracking Roads in Satellite Images

by Donald Geman, Bruno Jedynak - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 1995
"... We present a new approach for tracking roads from satellite images, and thereby illustrate a general computational strategy ("active testing") for tracking 1D structures and other recognition tasks in computer vision. Our approach is related to recent work in active vision on "where ..."
Abstract - Cited by 186 (7 self) - Add to MetaCart
;where to look next" and motivated by the "divide-and-conquer" strategy of parlor games such as "Twenty Questions." We choose "tests" (matched filters for short road segments) one at a time in order to remove as much uncertainty as possible about the "true hypothesis

A Theory of Learning Classification Rules

by Wray Lindsay Buntine , 1992
"... The main contributions of this thesis are a Bayesian theory of learning classification rules, the unification and comparison of this theory with some previous theories of learning, and two extensive applications of the theory to the problems of learning class probability trees and bounding error whe ..."
Abstract - Cited by 89 (6 self) - Add to MetaCart
to the problem of learning classification rules is reviewed, then a Bayesian framework for such learning is presented. The framework has three components: the hypothesis space, the learning protocol, and criteria for successful learning. Several learning protocols are analysed in detail: queries, logical, noisy
Next 10 →
Results 11 - 20 of 2,667
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University