Results 1 - 10
of
5,779
Pushing the EL envelope
- In Proc. of IJCAI 2005
, 2005
"... Recently, it has been shown that the small description logic (DL) EL, which allows for conjunction and existential restrictions, has better algorithmic properties than its counterpart FL0, which allows for conjunction and value restrictions. Whereas the subsumption problem in FL0 becomes already int ..."
Abstract
-
Cited by 461 (59 self)
- Add to MetaCart
intractable in the presence of acyclic TBoxes, it remains tractable in EL even with general concept inclusion axioms (GCIs). On the one hand, we extend the positive result for EL by identifying a set of expressive means that can be added to EL without sacrificing tractability. On the other hand, we show
Précis of "The number sense"
"... Number sense " is a short-hand for our ability to quickly understand, approximate, and manipulate numerical quantities. My hypothesis is that number sense rests on cerebral circuits that have evolved specifically for the purpose of representing basic arithmetic knowledge. Four lines of evidence ..."
Abstract
-
Cited by 313 (25 self)
- Add to MetaCart
Number sense " is a short-hand for our ability to quickly understand, approximate, and manipulate numerical quantities. My hypothesis is that number sense rests on cerebral circuits that have evolved specifically for the purpose of representing basic arithmetic knowledge. Four lines
Cooperative sensing among cognitive radios
- In Proc. of the IEEE International Conference on Communications (ICC
, 2006
"... Abstract — Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual Radio might f ..."
Abstract
-
Cited by 289 (15 self)
- Add to MetaCart
and hence a few independent users perform better than many correlated users. Unfortunately, cooperative gain is very sensitive to adversarial/failing Cognitive Radios. Radios that fail in a known way (always report the presence/absence of a Primary user) can be compensated for by censoring them
MANAGING WITH STYLE: THE EFFECT OF MANAGERS ON FIRM POLICIES
, 2003
"... This paper investigates whether and how individual managers affect corporate behavior and performance. We construct a manager-firm matched panel data set which enables us to track the top managers across different firms over time. We find that manager fixed effects matter for a wide range of corpora ..."
Abstract
-
Cited by 251 (7 self)
- Add to MetaCart
of corporate decisions. A significant extent of the heterogeneity in investment, financial and organizational practices of firms can be explained by the presence of manager fixed effects. We identify specific patterns in managerial decision making that appear to indicate general differences in “style” across
Estimating 3D Hand Pose From a Cluttered Image
, 2003
"... A method is proposed that can generate a ranked list of plausible three-dimensional hand configurations that best match an input image. Hand pose estimation is formulated as an image database indexing problem, where the closest matches for an input hand image are retrieved from a large database of s ..."
Abstract
-
Cited by 173 (7 self)
- Add to MetaCart
of synthetic hand images. In contrast to previous approaches, the system can function in the presence of clutter, thanks to two novel clutter-tolerant indexing methods. First, a computationally efficient approximation of the image-to-model chamfer distance is obtained by embedding binary edge images into a
Certificateless Public Key Cryptography
- ASIACRYPT'03
, 2003
"... This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who ..."
Abstract
-
Cited by 240 (4 self)
- Add to MetaCart
) who is in possession of a master key. In these respects, CL-PKC is similar to identity-based public key cryptography (ID-PKC). On the other hand, CL-PKC does not suffer from the key escrow property that seems to be inherent in ID-PKC. Thus CL-PKC can be seen as a model for the use of public key
Symphony: Distributed Hashing in a Small World
- IN PROCEEDINGS OF THE 4TH USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS
, 2003
"... We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our constr ..."
Abstract
-
Cited by 211 (13 self)
- Add to MetaCart
construction is scalable, flexible, stable in the presence of frequent updates and offers small average latency with only a handful of long distance links per node. The cost of updates when hosts join and leave is small.
On the Influence of the Kernel on the Consistency of Support Vector Machines
- Journal of Machine Learning Research
, 2001
"... In this article we study the generalization abilities of several classifiers of support vector machine (SVM) type using a certain class of kernels that we call universal. It is shown that the soft margin algorithms with universal kernels are consistent for a large class of classification problems ..."
Abstract
-
Cited by 212 (21 self)
- Add to MetaCart
problems including some kind of noisy tasks provided that the regularization parameter is chosen well. In particular we derive a simple su#cient condition for this parameter in the case of Gaussian RBF kernels. On the one hand our considerations are based on an investigation of an approximation property
Hands Up: Attentional Prioritization of Space Near the Hand
"... This study explored whether hand location affected spatial attention. The authors used a visual covertorienting paradigm to examine whether spatial attention mechanisms—location prioritization and shifting attention—were supported by bimodal, hand-centered representations of space. Placing 1 hand ne ..."
Abstract
-
Cited by 14 (1 self)
- Add to MetaCart
next to a target location, participants detected visual targets following highly predictive visual cues. There was no a priori reason for the hand to influence task performance unless hand presence influenced attention. Results showed that target detection near the hand was facilitated relative
Rapid and simple method for preparation of RNA from Saccharomyces cerevisiae. Nucleic Acids Res
, 1990
"... Most methods for isolation of RNA from yeast require tedious vortexing with glass beads, and give low yields when scaled down to 10 ml cultures (1). In addition, it is frequently desirable to prepare RNA from several different yeast strains grown under a variety of growth conditions, and preparation ..."
Abstract
-
Cited by 196 (1 self)
- Add to MetaCart
, and preparations using glass beads are impractical when dealing with multiple samples. Heating and freezing of yeast cells in the presence of phenol and SDS has been used for large scale isolation of RNA from yeast (2). We report here a mini-prep version of yeast RNA isolation using phenol and SDS that allows
Results 1 - 10
of
5,779