• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 27,471
Next 10 →

Intelligence Without Representation

by Rodney Brooks - Artificial Intelligence , 1991
"... Artificial intelligence research has foundered on the issue of representation. When intelligence is approached in an incremental manner, with strict reliance on interfacing to the real world through perception and action, reliance on representation disappears. In this paper we outline our approach t ..."
Abstract - Cited by 1798 (13 self) - Add to MetaCart
to incrementally building complete intelligent Creatures. The fundamental decomposition of the intelligent system is not into independent information processing units which must interface with each other via representations. Instead, the intelligent system is decomposed into independent and parallel activity

The Ponder Policy Specification Language

by Nicodemos Damianou , Naranker Dulay , Emil Lupu , Morris Sloman - LECTURE NOTES IN COMPUTER SCIENCE , 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract - Cited by 499 (28 self) - Add to MetaCart
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management

DART: Directed automated random testing

by Patrice Godefroid, Nils Klarlund, Koushik Sen - In Programming Language Design and Implementation (PLDI , 2005
"... We present a new tool, named DART, for automatically testing software that combines three main techniques: (1) automated extraction of the interface of a program with its external environment using static source-code parsing; (2) automatic generation of a test driver for this interface that performs ..."
Abstract - Cited by 843 (42 self) - Add to MetaCart
that performs random testing to simulate the most general environment the program can operate in; and (3) dynamic analysis of how the program behaves under random testing and automatic generation of new test inputs to direct systematically the execution along alternative program paths. Together, these three

A scheduling model for reduced CPU energy

by Frances Yao, Alan Demers, Scott Shenker - ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE , 1995
"... The energy usage of computer systems is becoming an important consideration, especially for batteryoperated systems. Various methods for reducing energy consumption have been investigated, both at the circuit level and at the operating systems level. In this paper, we propose a simple model of job s ..."
Abstract - Cited by 558 (3 self) - Add to MetaCart
The energy usage of computer systems is becoming an important consideration, especially for batteryoperated systems. Various methods for reducing energy consumption have been investigated, both at the circuit level and at the operating systems level. In this paper, we propose a simple model of job

The Small-World Phenomenon: An Algorithmic Perspective

by Jon Kleinberg - in Proceedings of the 32nd ACM Symposium on Theory of Computing , 2000
"... Long a matter of folklore, the “small-world phenomenon ” — the principle that we are all linked by short chains of acquaintances — was inaugurated as an area of experimental study in the social sciences through the pioneering work of Stanley Milgram in the 1960’s. This work was among the first to m ..."
Abstract - Cited by 824 (5 self) - Add to MetaCart
to make the phenomenon quantitative, allowing people to speak of the “six degrees of separation ” between any two people in the United States. Since then, a number of network models have been proposed as frameworks in which to study the problem analytically. One of the most refined of these models

Automatically tuned linear algebra software

by R. Clint Whaley, Jack J. Dongarra - CONFERENCE ON HIGH PERFORMANCE NETWORKING AND COMPUTING , 1998
"... This paper describes an approach for the automatic generation and optimization of numerical software for processors with deep memory hierarchies and pipelined functional units. The production of such software for machines ranging from desktop workstations to embedded processors can be a tedious and ..."
Abstract - Cited by 478 (26 self) - Add to MetaCart
This paper describes an approach for the automatic generation and optimization of numerical software for processors with deep memory hierarchies and pipelined functional units. The production of such software for machines ranging from desktop workstations to embedded processors can be a tedious

Temperature-aware microarchitecture

by Kevin Skadron, Mircea R. Stan, Wei Huang, Sivakumar Velusamy, Karthik Sankaranarayanan, David Tarjan - In Proceedings of the 30th Annual International Symposium on Computer Architecture , 2003
"... With power density and hence cooling costs rising exponentially, processor packaging can no longer be designed for the worst case, and there is an urgent need for runtime processor-level techniques that can regulate operating temperature when the package’s capacity is exceeded. Evaluating such techn ..."
Abstract - Cited by 478 (52 self) - Add to MetaCart
With power density and hence cooling costs rising exponentially, processor packaging can no longer be designed for the worst case, and there is an urgent need for runtime processor-level techniques that can regulate operating temperature when the package’s capacity is exceeded. Evaluating

An abstract characterization of unital operator spaces

by Xu-jian Huang, Chi-keung Ng , 2008
"... In this article, we give an abstract characterization of the “identity ” of an operator space V by looking at a quantity ncb(V, u) which is defined in analogue to a well-known quantity in Banach space theory. More precisely, we show that there exists a complete isometry from V to some L(H) sending u ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
u to idH if and only if ncb(V, u) = 1. We will use it to give an abstract characterization of operator systems. Moreover, we will show that if V is a unital operator space and W is a proper complete M-ideal, then V/W is also a unital operator space. As a consequece, the quotient of an operator

Unit Operations for Automated Class Testing

by Nigel Daley, Nigel Daley, Daniel Hoffman, Daniel Hoffman, Paul Strooper, Paul Strooper , 2000
"... s and compressed postscript files are available via http://svrc.it.uq.edu.au Unit Operations for Automated Class Testing Nigel Daley Daniel Hoffman y Paul Strooper z Abstract With the advent of object-oriented languages and the portability of Java, the development and use of reusable softw ..."
Abstract - Cited by 6 (4 self) - Add to MetaCart
s and compressed postscript files are available via http://svrc.it.uq.edu.au Unit Operations for Automated Class Testing Nigel Daley Daniel Hoffman y Paul Strooper z Abstract With the advent of object-oriented languages and the portability of Java, the development and use of reusable

Metric characterizations of isometries and of unital operator spaces and systems

by David P. Blecher, Matthew Neal , 2008
"... We give some new characterizations of unitaries, isometries, unital operator spaces, operator systems, C∗-algebras, and related objects. These characterizations only employ the vector space and operator space structure. ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
We give some new characterizations of unitaries, isometries, unital operator spaces, operator systems, C∗-algebras, and related objects. These characterizations only employ the vector space and operator space structure.
Next 10 →
Results 1 - 10 of 27,471
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University