Results 1 - 10
of
2,762
Laplacian eigenmaps and spectral techniques for embedding and clustering.
- Proceeding of Neural Information Processing Systems,
, 2001
"... Abstract Drawing on the correspondence between the graph Laplacian, the Laplace-Beltrami op erator on a manifold , and the connections to the heat equation , we propose a geometrically motivated algorithm for constructing a representation for data sampled from a low dimensional manifold embedded in ..."
Abstract
-
Cited by 668 (7 self)
- Add to MetaCart
retrieval and data mining, one is often confronted with intrinsically low dimensional data lying in a very high dimensional space. For example, gray scale n x n images of a fixed object taken with a moving camera yield data points in rn: n2 . However , the intrinsic dimensionality of the space of all images
Formally Veri ed Conditions for Regularity of Interval Matrices
, 2010
"... Abstract. We propose a formal study of interval analysis that concentrates on theoretical aspects rather than on computational ones. In particular we are interested in conditions for regularity of interval matrices. An interval matrix is called regular if all scalar matrices included in the interval ..."
Abstract
- Add to MetaCart
Abstract. We propose a formal study of interval analysis that concentrates on theoretical aspects rather than on computational ones. In particular we are interested in conditions for regularity of interval matrices. An interval matrix is called regular if all scalar matrices included in the interval matrix have non-null determinant and it is called singular otherwise. Regularity plays a central role in solving systems of linear interval equations. Several tests for regularity are available and widely used, but sometimes rely on rather involved results, hence the interest in formally verifying such conditions of regularity. In this paper we set the basis for this work: we de ne intervals, interval matrices and operations on them in the proof assistant Coq, and verify criteria for regularity and singularity of interval matrices.
Mechanized Formal Semantics and Veri ed Compilation for C++ Objects
"... Les objets en C++: sémantique formelle mécanisée et compilation véri ée ..."
Generalization in Reinforcement Learning: Safely Approximating the Value Function
- Advances in Neural Information Processing Systems 7
, 1995
"... To appear in: G. Tesauro, D. S. Touretzky and T. K. Leen, eds., Advances in Neural Information Processing Systems 7, MIT Press, Cambridge MA, 1995. A straightforward approach to the curse of dimensionality in reinforcement learning and dynamic programming is to replace the lookup table with a genera ..."
Abstract
-
Cited by 307 (4 self)
- Add to MetaCart
To appear in: G. Tesauro, D. S. Touretzky and T. K. Leen, eds., Advances in Neural Information Processing Systems 7, MIT Press, Cambridge MA, 1995. A straightforward approach to the curse of dimensionality in reinforcement learning and dynamic programming is to replace the lookup table with a
Investment-Cash Flow Sensitivities Are not Valid Measures of Financing Constraints
- Quarterly Journal of Economics
, 2000
"... Work by Kaplan and Zingales provides both theoretical arguments and empirical evidence that investment-cash �ow sensitivities are not good indicators of �nancing constraints. Fazzari, Hubbard, and Petersen {this Journal} criticize those �ndings. In this note we explain how the Fazzari et al. critici ..."
Abstract
-
Cited by 214 (0 self)
- Add to MetaCart
. criticisms are either very supportive of the claims in earlier work by Kaplan and Zingales or incorrect. We conclude with a discussion of unanswered questions. Fazzari, Hubbard, and Petersen {1988} (hereinafter, FHP {1988}) introduce a methodology to identify the presence of �nancing constraints based
CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows In C
, 2000
"... Erroneous string manipulations are a major source of software defects in C programs yielding vulnerabilities which are exploited by software viruses. We present C String Static Verifyer (CSSV), a tool that statically uncovers all string manipulation errors. Being a conservative tool, it reports all ..."
Abstract
-
Cited by 137 (6 self)
- Add to MetaCart
' contracts are allowed which are veri ed by the tool.
Model Abstraction for Formal Veri cation
"... Abstract As the complexity of circuit designs grows, designers look toward formal veri cation to achieve better test coverage for validating complex designs. However, this approach is inherently computationally intensive, and hence, only small designs can be veri ed using this method. To achieve be ..."
Abstract
- Add to MetaCart
Abstract As the complexity of circuit designs grows, designers look toward formal veri cation to achieve better test coverage for validating complex designs. However, this approach is inherently computationally intensive, and hence, only small designs can be veri ed using this method. To achieve
Symbolic model checking with rich assertional languages
- Theoretical Computer Science
, 1997
"... Abstract. The paper shows that, by an appropriate choice of a rich assertional language, it is possible to extend the utility of symbolic model checking beyond the realm of bdd-represented nite-state systems into the domain of in nite-state systems, leading to a powerful technique for uniform veri c ..."
Abstract
-
Cited by 120 (4 self)
- Add to MetaCart
cation of unbounded (parameterized) process networks. The main contributions of the paper are a formulation of a general framework for symbolic model checking of in nite-state systems, a demonstration that many individual examples of uniformly veri ed parameterized designs that appear in the literature
Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.
- Journal of Personality and Social Psychology,
, 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract
-
Cited by 183 (19 self)
- Add to MetaCart
Sciences and Humanities Research Council of Canada and grants from le Fonds pour la Formation des Chercheurs et l'Aide a la Recherche and the University du Quebec a Montreal. We would like to thank Ed Deci, Andrew Elliott, Marc Blais, Stephane Perreault, and Luc Pelletier for their feedback
Linear Pushbroom Cameras
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 1994
"... Modelling th# push broom sensors commonly used in satellite imagery is quite di#cult and computationally intensive due to th# complicated motion ofth# orbiting satellite with respect to th# rotating earth# In addition, th# math#46 tical model is quite complex, involving orbital dynamics, andh#(0k is ..."
Abstract
-
Cited by 169 (6 self)
- Add to MetaCart
is di#cult to analyze. Inth#A paper, a simplified model of apush broom sensor(th# linear push broom model) is introduced. Ith as th e advantage of computational simplicity wh#A9 atth# same time giving very accurate results compared with th# full orbitingpush broom model. Meth# ds are given for solving
Results 1 - 10
of
2,762