• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 48,509
Next 10 →

Hypertext Transfer Protocol - HTTP/1.1

by R. Fielding, H. Frystyk, Tim Berners-Lee, J. Gettys, J. C. Mogul , 1996
"... The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed object management systems, through exten ..."
Abstract - Cited by 908 (27 self) - Add to MetaCart
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed object management systems, through

The Symbol Grounding Problem

by Stevan Harnad , 1990
"... There has been much discussion recently about the scope and limits of purely symbolic models of the mind and about the proper role of connectionism in cognitive modeling. This paper describes the "symbol grounding problem": How can the semantic interpretation of a formal symbol system be m ..."
Abstract - Cited by 1084 (20 self) - Add to MetaCart
There has been much discussion recently about the scope and limits of purely symbolic models of the mind and about the proper role of connectionism in cognitive modeling. This paper describes the "symbol grounding problem": How can the semantic interpretation of a formal symbol system

Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR

by Gavin Lowe , 1996
"... In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol is s ..."
Abstract - Cited by 719 (13 self) - Add to MetaCart
In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol, which allows an intruder to impersonate another agent. We adapt the protocol, and then use FDR to show that the new protocol

Plans And Resource-Bounded Practical Reasoning

by Michael E. Bratman, David J. Israel, Martha E. Pollack - COMPUTATIONAL INTELLIGENCE, 4(4):349-355, 1988 , 1988
"... An architecture for a rational agent must allow for means-end reasoning, for the weighing of competing alternatives, and for interactions between these two forms of reasoning. Such an architecture must also address the problem of resource boundedness. We sketch a solution of the first problem that p ..."
Abstract - Cited by 488 (19 self) - Add to MetaCart
An architecture for a rational agent must allow for means-end reasoning, for the weighing of competing alternatives, and for interactions between these two forms of reasoning. Such an architecture must also address the problem of resource boundedness. We sketch a solution of the first problem

The Retinoblastoma Protein and Cell-Cycle Control

by Robert A. Weinberg - Cell , 1995
"... pRB, the product of the retinoblastoma tumor suppressor gene, operates in the midst of the cell cycle clock appara-tus. Its main role is to act as a signal transducer connecting the cell cycle clock with the transcriptional machinery. In this role, pRB allows the clock to control the expression of b ..."
Abstract - Cited by 429 (5 self) - Add to MetaCart
pRB, the product of the retinoblastoma tumor suppressor gene, operates in the midst of the cell cycle clock appara-tus. Its main role is to act as a signal transducer connecting the cell cycle clock with the transcriptional machinery. In this role, pRB allows the clock to control the expression

MPI: A Message-Passing Interface Standard

by Message Passing Interface Forum , 1994
"... process naming to allow libraries to describe their communication in terms suitable to their own data structures and algorithms, ffl The ability to "adorn" a set of communicating processes with additional user-defined attributes, such as extra collective operations. This mechanism should ..."
Abstract - Cited by 410 (0 self) - Add to MetaCart
process naming to allow libraries to describe their communication in terms suitable to their own data structures and algorithms, ffl The ability to "adorn" a set of communicating processes with additional user-defined attributes, such as extra collective operations. This mechanism should

How to make a decision: the analytic hierarchy process

by Thomas L. Saaty - European Journal of Operational Research , 1990
"... Policy makers at all levels of decision making in organizations use multiple criteria to analyze their complex problems. Multicriteria thinking is used formally to facilitate their decision making. Through trade-offs it clarifies the advantages and disadvantages of policy options under circumstances ..."
Abstract - Cited by 411 (0 self) - Add to MetaCart
, this process should also allow for consensus building and compromise. Individual knowledge and experience are inadequate in making decisions concerning the welfare and quality of life for a group. Participation and debate are needed both among individuals and between the groups affected. Here two aspects

What memory is for

by Arthur M. Glenberg , 1997
"... Let’s start from scratch in thinking about what memory is for, and consequently, how it works. Suppose that memory and conceptualization work in the service of perception and action. In this case, conceptualization is the encoding of patterns of possible physical interaction with a three-dimensiona ..."
Abstract - Cited by 396 (5 self) - Add to MetaCart
supporting, but automatic, role. A significant human skill is learning to suppress the overriding contribution of the environment to conceptualization, thereby allowing memory to guide conceptualization. The effort used in suppressing input from the environment pays off by allowing prediction, recollective

Image Representation Using 2D Gabor Wavelets

by Tai Sing Lee - IEEE Trans. Pattern Analysis and Machine Intelligence , 1996
"... This paper extends to two dimensions the frame criterion developed by Daubechies for one-dimensional wavelets, and it computes the frame bounds for the particular case of 2D Gabor wavelets. Completeness criteria for 2D Gabor image representations are important because of their increasing role in man ..."
Abstract - Cited by 375 (4 self) - Add to MetaCart
This paper extends to two dimensions the frame criterion developed by Daubechies for one-dimensional wavelets, and it computes the frame bounds for the particular case of 2D Gabor wavelets. Completeness criteria for 2D Gabor image representations are important because of their increasing role

A Tutorial on Learning Bayesian Networks

by David Heckerman - Communications of the ACM , 1995
"... We examine a graphical representation of uncertain knowledge called a Bayesian network. The representation is easy to construct and interpret, yet has formal probabilistic semantics making it suitable for statistical manipulation. We show how we can use the representation to learn new knowledge by c ..."
Abstract - Cited by 365 (12 self) - Add to MetaCart
the best of both worlds. Namely, the representation allows us to learn new knowledge by combining expert domain knowledge and statistical data. A Bayesian network is a graphical representation of uncertain knowledge that most people find easy to construct and interpret. In addition, the representation has
Next 10 →
Results 11 - 20 of 48,509
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University