• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,318
Next 10 →

The Meme Machine

by Susan Blackmore , 1999
"... Setting aside the problems of recognising consciousness in a machine, this article considers what would be needed for a machine to have human-like consciousness. Human-like consciousness is an illusion; that is, it exists but is not what it appears to be. The illusion that we are a conscious self ha ..."
Abstract - Cited by 381 (2 self) - Add to MetaCart
having a stream of experiences is constructed when memes compete for replication by human hosts. Some memes survive by being promoted as personal beliefs, desires, opinions and possessions, leading to the formation of a memeplex (or selfplex). Any machine capable of imitation would acquire this type

Modeling and control of formations of nonholonomic mobile robots,”,

by Jaydev P Desai , James P Ostrowski , Vijay Kumar - IEEE Transaction on Robotic and Automation, , 2001
"... Abstract-This paper addresses the control of a team of nonholonomic mobile robots navigating in a terrain with obstacles while maintaining a desired formation and changing formations when required, using graph theory. We model the team as a triple, ( ), consisting of a group element that describes ..."
Abstract - Cited by 225 (17 self) - Add to MetaCart
Abstract-This paper addresses the control of a team of nonholonomic mobile robots navigating in a terrain with obstacles while maintaining a desired formation and changing formations when required, using graph theory. We model the team as a triple, ( ), consisting of a group element that describes

A Theory of Single-Viewpoint Catadioptric Image Formation

by Simon Baker, Shree K. Nayar - International Journal of Computer Vision , 1999
"... Conventional video cameras have limited fields of view which make them restrictive for certain applications in computational vision. A catadioptric sensor uses a combination of lenses and mirrors placed in a carefully arranged configuration to capture a much wider field of view. One important design ..."
Abstract - Cited by 236 (12 self) - Add to MetaCart
design goal for catadioptric sensors is choosing the shapes of the mirrors in a way that ensures that the complete catadioptric system has a single effective viewpoint. The reason a single viewpoint is so desirable is that it is a requirement for the generation of pure perspective images from the sensed

Improved Use of Continuous Attributes in C4.5

by J. R. Quinlan - Journal of Artificial Intelligence Research , 1996
"... A reported weakness of C4.5 in domains with continuous attributes is addressed by modifying the formation and evaluation of tests on continuous attributes. An MDL-inspired penalty is applied to such tests, eliminating some of them from consideration and altering the relative desirability of all test ..."
Abstract - Cited by 281 (1 self) - Add to MetaCart
A reported weakness of C4.5 in domains with continuous attributes is addressed by modifying the formation and evaluation of tests on continuous attributes. An MDL-inspired penalty is applied to such tests, eliminating some of them from consideration and altering the relative desirability of all

Semistructured data

by Peter Buneman , 1997
"... In semistructured data, the information that is normally as-sociated with a schema is contained within the data, which is sometimes called “self-describing”. In some forms of semi-structured data there is no separate schema, in others it exists but only places loose constraints on the data. Semi-str ..."
Abstract - Cited by 281 (0 self) - Add to MetaCart
-structured data has recently emerged as an important topic of study for a variety of reasons. First, there are data sources such as the Web, which we would like to treat as databases but which cannot be constrained by a schema. Second, it may be desirable to have an extremely flexible format for data exchange

Coalition Structure Generation with Worst Case Guarantees

by Tuomas Sandholm, Kate Larson , Martin Andersson , Onn Shehory , Fernando Tohmé , 1999
"... Coalition formation is a key topic in multiagent systems. One may prefer a coalition structure that maximizes the sum of the values of the coalitions, but often the number of coalition structures is too large to allow exhaustive search for the optimal one. Furthermore, finding the optimal coalition ..."
Abstract - Cited by 270 (9 self) - Add to MetaCart
Coalition formation is a key topic in multiagent systems. One may prefer a coalition structure that maximizes the sum of the values of the coalitions, but often the number of coalition structures is too large to allow exhaustive search for the optimal one. Furthermore, finding the optimal coalition

Automatic vigilance: the attention-grabbing power of negative social information

by Felicia Pratto, Oliver P. John - Journal of Personality and Social Psychology , 1991
"... One of the functions of automatic stimulus evaluation is to direct attention toward events that may have undesirable consequences for the perceiver's well-being. To test whether attentional resources are automatically directed away from an attended task to undesirable stimuli, Ss named the colo ..."
Abstract - Cited by 232 (2 self) - Add to MetaCart
the colors in which desirable and undesirable traits (e.g., honest, sadistic) appeared. Across 3 experiments, color-naming latencies were consistently longer for undesirable traits but did not differ within the desirable and undesirable categories. In Experiment 2, Ss also showed more incidental learning

Multiobjective Optimization and Multiple Constraint Handling with Evolutionary Algorithms-Part I: A Unified Formulation

by Carlos M. Fonseca, Peter J. Fleming - IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans , 1998
"... In optimization, multiple objectives and constraints cannot be handled independently of the underlying optimizer. Requirements such as continuity and differentiability of the cost surface add yet another conflicting element to the decision process. While ``better'' solutions should be rate ..."
Abstract - Cited by 232 (13 self) - Add to MetaCart
be rated higher than ``worse'' ones, the resulting cost landscape must also comply with such requirements. Evolutionary algorithms (EAs), which have found application in many areas not amenable to optimization by other methods, possess many characteristics desirable in a multiobjective optimizer

Java Security: From HotJava to Netscape and Beyond

by Drew Dean, Edward W. Felten, Dan S. Wallach - IEEE Symposium on Security and Privacy , 1996
"... The introduction of Java applets has taken the World Wide Web by storm. Information servers can customize the presentation of their content with server-supplied code which executes inside the Web browser. We examine the Java language and both the HotJava and Netscape browsers which support it, and f ..."
Abstract - Cited by 221 (5 self) - Add to MetaCart
and the bytecode format. On a deeper level, these flaws arise because of weaknesses in the design methodology used in creating Java and the browsers. In addition to the flaws, we discuss the underlying tension between the openness desired by Web application writers and the security needs of their users, and we

Supervisor

by Tim Van Rossum, Dr. M. J. Marx, Dr. D. Grossi
"... 2.2 Desired format of the data.................... 3 ..."
Abstract - Add to MetaCart
2.2 Desired format of the data.................... 3
Next 10 →
Results 1 - 10 of 3,318
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University