• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 25,038
Next 10 →

Decision-Theoretic Planning: Structural Assumptions and Computational Leverage

by Craig Boutilier, Thomas Dean, Steve Hanks - JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH , 1999
"... Planning under uncertainty is a central problem in the study of automated sequential decision making, and has been addressed by researchers in many different fields, including AI planning, decision analysis, operations research, control theory and economics. While the assumptions and perspectives ..."
Abstract - Cited by 515 (4 self) - Add to MetaCart
Planning under uncertainty is a central problem in the study of automated sequential decision making, and has been addressed by researchers in many different fields, including AI planning, decision analysis, operations research, control theory and economics. While the assumptions

Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses

by Daphna Oyserman, Heather M. Coon, Markus Kemmelmeier - Psychological Bulletin , 2002
"... Are Americans more individualistic and less collectivistic than members of other groups? The authors summarize plausible psychological implications of individualism–collectivism (IND-COL), meta-analyze cross-national and within-United States IND-COL differences, and review evidence for effects of IN ..."
Abstract - Cited by 520 (11 self) - Add to MetaCart
Are Americans more individualistic and less collectivistic than members of other groups? The authors summarize plausible psychological implications of individualism–collectivism (IND-COL), meta-analyze cross-national and within-United States IND-COL differences, and review evidence for effects

Public Key Cryptography from Different Assumptions

by Boaz Barak, Avi Wigderson , 2008
"... We construct a new public key encryption based on two assumptions: 1. One can obtain a pseudorandom generator with small locality by connecting the outputs to the inputs using any sufficiently good unbalanced expander. 2. It is hard to distinguish between a random graph that is such an expander and ..."
Abstract - Cited by 22 (4 self) - Add to MetaCart
We construct a new public key encryption based on two assumptions: 1. One can obtain a pseudorandom generator with small locality by connecting the outputs to the inputs using any sufficiently good unbalanced expander. 2. It is hard to distinguish between a random graph that is such an expander

Nonparametric estimation of average treatment effects under exogeneity: a review

by Guido W. Imbens - REVIEW OF ECONOMICS AND STATISTICS , 2004
"... Recently there has been a surge in econometric work focusing on estimating average treatment effects under various sets of assumptions. One strand of this literature has developed methods for estimating average treatment effects for a binary treatment under assumptions variously described as exogen ..."
Abstract - Cited by 630 (25 self) - Add to MetaCart
as exogeneity, unconfoundedness, or selection on observables. The implication of these assumptions is that systematic (for example, average or distributional) differences in outcomes between treated and control units with the same values for the covariates are attributable to the treatment. Recent analysis has

The unbearable automaticity of being

by John A. Bargh, Tanya L. Chartrand - AMERICAN PSYCHOLOGIST , 1999
"... What was noted by E. J. hanger (1978) remains true today: that much of contemporary psychological research is based on the assumption that people are consciously and systematically processing incoming information in order to construe and interpret their world and to plan and engage in courses of act ..."
Abstract - Cited by 604 (17 self) - Add to MetaCart
What was noted by E. J. hanger (1978) remains true today: that much of contemporary psychological research is based on the assumption that people are consciously and systematically processing incoming information in order to construe and interpret their world and to plan and engage in courses

Games with Incomplete Information Played by 'Bayesian' Players, I-III

by John C Harsanyi - MANAGEMENT SCIENCE , 1967
"... The paper develops a new theory for the analysis of games with incomplete information where the players are uncertain about some important parameters of the game situation, such as the payoff functions, the strategies available to various players, the information other players have about the game, e ..."
Abstract - Cited by 787 (2 self) - Add to MetaCart
probability distributions derived from a certain "basic probability distribution " over the parameters unknown to the various players But later the theory is extended also to cases where the different players' subjective probability distributions fail to satisfy this consistency assumption

Capacity of multi-antenna Gaussian channels

by I. Emre Telatar - EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS , 1999
"... We investigate the use of multiple transmitting and/or receiving antennas for single user communications over the additive Gaussian channel with and without fading. We derive formulas for the capacities and error exponents of such channels, and describe computational procedures to evaluate such form ..."
Abstract - Cited by 2923 (6 self) - Add to MetaCart
such formulas. We show that the potential gains of such multi-antenna systems over single-antenna systems is rather large under independence assumptions for the fades and noises at different receiving antennas.

Diagnosing multiple faults.

by Johan De Kleer , Brian C Williams - Artificial Intelligence, , 1987
"... Abstract Diagnostic tasks require determining the differences between a model of an artifact and the artifact itself. The differences between the manifested behavior of the artifact and the predicted behavior of the model guide the search for the differences between the artifact and its model. The ..."
Abstract - Cited by 808 (62 self) - Add to MetaCart
Abstract Diagnostic tasks require determining the differences between a model of an artifact and the artifact itself. The differences between the manifested behavior of the artifact and the predicted behavior of the model guide the search for the differences between the artifact and its model

Anomaly Detection: A Survey

by Varun Chandola, Arindam Banerjee, Vipin Kumar , 2007
"... Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and c ..."
Abstract - Cited by 540 (5 self) - Add to MetaCart
and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal

A Survey of Program Slicing Techniques

by F. Tip - JOURNAL OF PROGRAMMING LANGUAGES , 1995
"... A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser in 197 ..."
Abstract - Cited by 790 (10 self) - Add to MetaCart
in 1979. Since then, various slightly different notions of program slices have been proposed, as well as a number of methods to compute them. An important distinction is that between a static and a dynamic slice. The former notion is computed without making assumptions regarding a program's input
Next 10 →
Results 1 - 10 of 25,038
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University