Results 1  10
of
16,682
The following definitions are used in this MTC:
"... This Minimum Technical Competence Document (MTC) is intended for use by schemes authorised under the Building Regulations 2010 for air tightness testing of new buildings. It sets out the minimum competence requirements to be met by members and testers applying to join such schemes and against which ..."
Abstract
 Add to MetaCart
This Minimum Technical Competence Document (MTC) is intended for use by schemes authorised under the Building Regulations 2010 for air tightness testing of new buildings. It sets out the minimum competence requirements to be met by members and testers applying to join such schemes and against which competency and knowledge will be assessed and monitored. The MTC also details how the scheme will operate. The competences relate to the air tightness testing and reporting for buildings as set out in the current relevant building standards for England and Wales which consist of • Conducting air tightness testing • Reporting on results of air tightness testing The detailed technical requirements for carrying out inspection and testing are set out in BS EN Standard 13829:2001 and the current relevant building standards for each jurisdiction of the United Kingdom.
Functions and their basic properties
 JOURNAL OF FORMALIZED MATHEMATICS
, 2003
"... The definitions of the mode Function and the graph of a function are introduced. The graph of a function is defined to be identical with the function. The following concepts are also defined: the domain of a function, the range of a function, the identity function, the composition of functions, the ..."
Abstract

Cited by 1336 (32 self)
 Add to MetaCart
The definitions of the mode Function and the graph of a function are introduced. The graph of a function is defined to be identical with the function. The following concepts are also defined: the domain of a function, the range of a function, the identity function, the composition of functions
Statistical pattern recognition: A review
 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 2000
"... The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network techniques ..."
Abstract

Cited by 1035 (30 self)
 Add to MetaCart
techniques and methods imported from statistical learning theory have bean receiving increasing attention. The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection
The protection of information in computer systems
"... This tutorial paper explores the mechanics of protecting computerstored information from unauthorized use or modification. It concentrates on those architectural structureswhether hardware or softwarethat are necessary to support information protection. The paper develops in three main sectio ..."
Abstract

Cited by 824 (2 self)
 Add to MetaCart
of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading. Glossary The following glossary provides, for reference, brief definitions for several terms as used in this paper in the context
Illusion and wellbeing: A social psychological perspective on mental health.
 Psychological Bulletin,
, 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract

Cited by 988 (20 self)
 Add to MetaCart
evaluations, exaggerated perceptions of control or mastery, and unrealistic optimismcan serve a wide variety of cognitive, affective, and social functions. We also attempt to resolve the following paraPreparation of this article was supported by National Science Foundation Grant BNS 8308524, National Cancer Institute
Security and Composition of Multiparty Cryptographic Protocols
 JOURNAL OF CRYPTOLOGY
, 1998
"... We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation. The definiti ..."
Abstract

Cited by 463 (19 self)
 Add to MetaCart
. The definitions follow the general paradigm of known definitions; yet some substantial modifications and simplifications are introduced. The composition operation is the natural `subroutine substitution' operation, formalized by Micali and Rogaway. We consider several standard settings for multi
Smooth Stabilization Implies Coprime Factorization
, 1989
"... This paper shows that coprime right factorizations exist for the input to state mapping of a continuous time nonlinear system provided that the smooth feedback stabilization problem be solvable for this system. In particular, it follows that feedback linearizable systems admit such factorizations. I ..."
Abstract

Cited by 472 (62 self)
 Add to MetaCart
This paper shows that coprime right factorizations exist for the input to state mapping of a continuous time nonlinear system provided that the smooth feedback stabilization problem be solvable for this system. In particular, it follows that feedback linearizable systems admit such factorizations
Policy gradient methods for reinforcement learning with function approximation.
 In NIPS,
, 1999
"... Abstract Function approximation is essential to reinforcement learning, but the standard approach of approximating a value function and determining a policy from it has so far proven theoretically intractable. In this paper we explore an alternative approach in which the policy is explicitly repres ..."
Abstract

Cited by 439 (20 self)
 Add to MetaCart
proportional to the gradient: where α is a positivedefinite step size. If the above can be achieved, then θ can usually be assured to converge to a locally optimal policy in the performance measure ρ. Unlike the valuefunction approach, here small changes in θ can cause only small changes in the policy
2.1. The following definitions are used in this document:
, 1035
"... This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this pro ..."
Abstract
 Add to MetaCart
, but the architechture of NOTIFY is intended to be extensible to other RR types. 1.3. This document intentionally gives more definition to the roles of "Master, " "Slave " and "Stealth " servers, their enumeration in NS RRs, and the SOA MNAME field. In that sense, this document can
Cooperation in the Finitely Repeated Prisoner's Dilemma
 Journal of Economic Theory
, 1982
"... A common observation in experiments involving finite repetition of the prisoners’ dilemma is that players do not always play the singleperiod dominant strategies (“finking”), but instead achieve some measure of cooperation. Yet finking at each stage is the only Nash equilibrium in the finitely repe ..."
Abstract

Cited by 388 (1 self)
 Add to MetaCart
developed in our work on the chainstore paradox (Kreps and Wilson [2], Milgrom and Roberts [4]). We refer the reader to those papers for motivation, formal definitions, and interpretation. The basic game that we consider consists of N repetitions of the following two person. bimatrix, stage game:
Results 1  10
of
16,682