• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 9,216
Next 10 →

A Structural Approach to Operational Semantics

by G. D. Plotkin , 1981
"... Syntax of a very simple programming language called L. What is abstract about it will be discussed a little here and later at greater length. For us syntax is a collection of syntactic sets of phrases; each set corresponds to a different type of phrase. Some of these sets are very simple and can be ..."
Abstract - Cited by 1541 (3 self) - Add to MetaCart
Syntax of a very simple programming language called L. What is abstract about it will be discussed a little here and later at greater length. For us syntax is a collection of syntactic sets of phrases; each set corresponds to a different type of phrase. Some of these sets are very simple and can be taken as given: Truthvalues This is the set T = ftt; ffg and is ranged over by (the metavariable) t (and we also happily employ for this (and any other) metavariable sub- and super-scripts to generate other metavariables: t ; t 0 ; t 1k ).

Strategies of Discourse Comprehension

by Teun A. Van Dijk, Walter Kintsch , 1983
"... El Salvador, Guatemala is a, study in black and white. On the left is a collection of extreme Marxist-Leninist groups led by what one diplomat calls “a pretty faceless bunch of people.’ ’ On the right is an entrenched elite that has dominated Central America’s most populous country since a CIA-backe ..."
Abstract - Cited by 601 (27 self) - Add to MetaCart
El Salvador, Guatemala is a, study in black and white. On the left is a collection of extreme Marxist-Leninist groups led by what one diplomat calls “a pretty faceless bunch of people.’ ’ On the right is an entrenched elite that has dominated Central America’s most populous country since a CIA-backed coup deposed the reformist government of Col. Jacobo Arbenz Guzmán in 1954. Moderates of the political center. embattled but alive in E1 Salvador, have virtually disappeared in Guatemala-joining more than 30.000 victims of terror over the last tifteen vears. “The situation in Guatemala is much more serious than in EI Salvador, ” declares one Latin American diplomat. “The oligarchy is that much more reactionary. and the choices are far fewer. “ ‘Zero’: The Guatemalan oligarchs hated Jimmy Carter for cutting off U.S. military aid in 1977 to protest human-rights abuses-and the right-wingers hired marimba bands and set off firecrackers on the night Ronald Reagan was elected. They considered Reagan an ideological kinsman and believed they had a special

Outside directors and CEO turnover

by Michael !i. Weisbach, Jim Dana, Franklin M. Fisher, Paul Healy, Cliff Holdemess, Bob Kaplan, Mervyn King, Kevin J. Murphy, Rick Ruback, Ross Watts, Kr. Y Weisbach, Especially Ben Hermahn - Journal of Financial Economics , 1988
"... ‘this paper examines the relation between the monitoring of CEOs by inside aud outside directors and CEO resignations. CEO resignations are predicted using stock returns and earnings changes as measures of prior performance. There is a stronger association between prior performance and the prhabilit ..."
Abstract - Cited by 465 (9 self) - Add to MetaCart
‘this paper examines the relation between the monitoring of CEOs by inside aud outside directors and CEO resignations. CEO resignations are predicted using stock returns and earnings changes as measures of prior performance. There is a stronger association between prior performance and the prhability of a resignation for companies with outsider-dominated boards than for companies with insider-dominated boards. This result dces not appear to be a function of ownership effects, size effects, or industry effects. Unexpected stock returns on days when resignations are announced are consistent with the view that directors increase firm value by removing bad management. Boards of directors are widely believed to play an important role in corporate governance, particularly in monitoring top manage4znt. Directors are supposed to supervise the actions of management, provide advice, and veto poor decisions. The board is the shareholders ’ first line of defense against incompetent management; in extreme cases, it wilt replace an errant chief executive officer (CEO). Discussing boards ’ effectiveness in this role, Jensen (1986) claims that ‘the internal control mechanism of corporations, which

A rapid hierarchical radiosity algorithm

by Pat Hanrahan, David Salzman - Computer Graphics , 1991
"... This paper presents a rapid hierarchical radiosity algorithm for illuminating scenes containing lar e polygonal patches. The afgorithm constructs a hierarchic“J representation of the form factor matrix by adaptively subdividing patches into su bpatches according to a user-supplied error bound. The a ..."
Abstract - Cited by 412 (11 self) - Add to MetaCart
This paper presents a rapid hierarchical radiosity algorithm for illuminating scenes containing lar e polygonal patches. The afgorithm constructs a hierarchic“J representation of the form factor matrix by adaptively subdividing patches into su bpatches according to a user-supplied error bound. The algorithm guarantees that all form factors are calculated to the same precision, removing many common image artifacts due to inaccurate form factors. More importantly, the al o-rithm decomposes the form factor matrix into at most O? n) blocks (where n is the number of elements). Previous radiosity algorithms represented the element-to-element transport interactions with n2 form factors. Visibility algorithms are given that work well with this approach. Standard techniques for shooting and gathering can be used with the hierarchical representation to solve for equilibrium radiosities, but we also discuss using a brightness-weighted error criteria, in conjunction with multigrldding, to even more rapidly progressively refine the image.

Computational Interpretations of the Gricean Maxims in the Generation of Referring Expressions

by Robert Dale, Ehud Reiter - COGNITIVE SCIENCE , 1995
"... We examine the problem of generating definite noun phrases that are appropriate referring expressions: that is, noun phrases that (a) successfully identify the intended referent to the hearer whilst (b) not conveying to him or her any false conversational implicatures (Grice, 1975). We review severa ..."
Abstract - Cited by 366 (35 self) - Add to MetaCart
We examine the problem of generating definite noun phrases that are appropriate referring expressions: that is, noun phrases that (a) successfully identify the intended referent to the hearer whilst (b) not conveying to him or her any false conversational implicatures (Grice, 1975). We review several possible computational interpretations of the conversational implicature maxims, with different computational costs, and argue that the simplest may be the best, because it seems to be closest to what human speakers do. We describe our recommended algorithm in detail, along with a specification of the resources a host system must provide in order to make use of the algorithm, and an implementation used in the natural language generation component of the IDAS system.

Programming Semantics for Multiprogrammed Computations

by Jack B. Dennis, Earl C. Van Horn - ASSOCIATION FOR COMPUTING MACHINERY CONFERENCE ON PROGRAMMING LANGUAGES AND PRAGMATICS, SAN DIMAS, CALIFORNIA, AUGUST 8-12, 1965 , 1965
"... ... between an assembly language and an advanced algebraic language. ..."
Abstract - Cited by 346 (4 self) - Add to MetaCart
... between an assembly language and an advanced algebraic language.

Maliciously Circuit-Private FHE

by Rafail Ostrovsky, Anat Paskin-cherniavsky, Beni Paskin-cherniavsky , 2013
"... We present a framework for constructing compact FHE (fully homomorphic encryption) which is circuit-private in the malicious setting. That is, even if both maliciously formed public key and ciphertext are used, encrypted outputs only reveal the evaluation of the circuit on some well-formed input x ∗ ..."
Abstract - Add to MetaCart
We present a framework for constructing compact FHE (fully homomorphic encryption) which is circuit-private in the malicious setting. That is, even if both maliciously formed public key and ciphertext are used, encrypted outputs only reveal the evaluation of the circuit on some well-formed input x

On FHE Without Bootstrapping (Informal)

by Aayush Jain , 2013
"... In this work we come up with two fully homomorphic schemes. First, we propose an IND-CPA secure symmetric key homomorphic encryption scheme using multivariate polynomial ring over finite fields. This scheme gives a method of constructing a CPA secure homomorphic encryption scheme from another symm ..."
Abstract - Add to MetaCart
polynomial rings. This scheme is not compact but has many interesting properties- It can evaluate circuits of arbitrary depths without bootstrapping for bounded length input to the algorithm. Second, we also describe another similar symmetric key scheme which is compact, fully homomorphic and doesn’t require

Shortlist: a connectionist model of continuous speech recognition

by Dennis Norris - Cognition , 1994
"... Previous work has shown how a back-propagation network with recurrent connections can successfully model many aspects of human spoken word recogni-tion (Norris, 1988, 1990, 1992, 1993). However, such networks are unable to revise their decisions in the light of subsequent context. TRACE (McClelland ..."
Abstract - Cited by 312 (14 self) - Add to MetaCart
Previous work has shown how a back-propagation network with recurrent connections can successfully model many aspects of human spoken word recogni-tion (Norris, 1988, 1990, 1992, 1993). However, such networks are unable to revise their decisions in the light of subsequent context. TRACE (McClelland & Elman, 1986), on the other hand, manages to deal appropriately with following context, but only by using a highly implausible architecture that fails to account for some important experimental results. A new model is presented which displays the more desirable properties of each of these models. In contrast to TRACE the new model is entirely bottom-up and can readily perform simulations with vocabularies of tens of thousands of words. 1.

Office of Fhe imce President

by J. Edgardo Campos, Ric. Bard H. Sabot, Jmedardh Cmso
"... bl ic Di sc lo su re A ut ho riz ed Pu bl ic ..."
Abstract - Add to MetaCart
bl ic Di sc lo su re A ut ho riz ed Pu bl ic
Next 10 →
Results 1 - 10 of 9,216
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University