Filters








482,974 Hits in 8.0 sec

Extended Abstracts

2010 Cartilage  
acknowledges Georgios Karnatzikos, MD from 2nd Orthopaedic Dept. of GH "G.Papageorgiou" at Thessaloniki, Greece, fellow at OASI Bioresearch Foundation, for his contribution. 16.2.3 Towards cartilage grafts with  ...  Acknowledgments: We acknowledge the EU for financial support ("STEPS"; FP6-#NMP3-CT-2005-500465) Acknowledgments: This study was supported by a grant from the New Energy and Industrial Technology Development  ...  ICRS unicompartmental knee replacement since the 2007 extended ICRS unicompartmental knee replacement since the 2007 extended ICRS abstract on the topic.1 The term applies to resurfacing either one abstract  ... 
doi:10.1177/1947603510386038 pmid:26075041 pmcid:PMC4300817 fatcat:m2mv3tnf6vhzndubvwdtltkh5y

Extended Abstracts

2011 Neonatology  
The myth is that histologic chorioamnionitis is a single diagnosis; however, chorioamnionitis simply indicates that the fetus has had one of a vast range of exposures, each with different implications  ...  turity that fetal exposures to infections/inflammation modulate postnatal outcomes.  ...  Acknowledgements: Research supported, in part, by NIH grant HD057744 and a Gerber Foundation Grant.  ... 
doi:10.1159/000329938 fatcat:n5fm7o2c7rdcdcbymw3jvl4bpq

Extended Abstracts

2003 Blood Purification  
Indeed, for a young patient on dialysis, cardiovascular mortality, even when risk adjusted for traditional cardiovascular risk factors, is almost 100-fold greater than in the general population and approaches  ...  However, orderly transport in macroscopic environments has its problems: (1) The time required for diffusional exchange of a reasonable fraction of what is in one liquid with the other increases with the  ... 
doi:10.1159/000072553 fatcat:4nb76qsbazfzzhx5e5f7x5gkdi

Balanced allocations (extended abstract)

Yossi Azar, Andrei Z. Broder, Anna R. Karlin, Eli Upfal
1994 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94  
It is well known that when we are done, the fullest box has with high probability inn/ in In n(l + o(l)) balls in it.  ...  We show that with high probability, the fullest box contains only in in n/ in 2+0(1) balls -exponentially less than before.  ...  It is possible to extend some of these results to the case where machine z~ill is in It4(j) with probability p,, the sequences are of arbitrary length and the weights are arbitrary.  ... 
doi:10.1145/195058.195412 dblp:conf/stoc/AzarBKU94 fatcat:3dzj3wqs75gwfjbmrgh2ijrfke

Structured Production System (extended abstract) [article]

Yi Zhou
2017 arXiv   pre-print
In this extended abstract, we propose Structured Production Systems (SPS), which extend traditional production systems with well-formed syntactic structures.  ...  Due to the richness of structures, structured production systems significantly enhance the expressive power as well as the flexibility of production systems, for instance, to handle uncertainty.  ...  Acknowledgement The author would like to thank Prof. Fangzhen Lin for his comments on a first draft of this paper.  ... 
arXiv:1704.07950v1 fatcat:ne2grjwllndttoo33fisoloh7i

Approximate Value Iteration with Temporally Extended Actions (Extended Abstract)

Timothy A. Mann, Shie Mannor, Doina Precup
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
The options framework provides a concrete way to implement and reason about temporally extended actions.  ...  We provide a general analysis of the convergence rate of a popular Approximate Value Iteration (AVI) algorithm called Fitted Value Iteration (FVI) with options.  ...  We derive bounds that help us reason about when AVI with temporally extended actions converges faster than AVI with only primitive actions.  ... 
doi:10.24963/ijcai.2017/717 dblp:conf/ijcai/MannMP17 fatcat:csrdxrsbvrcmtlaglzs2jp3kh4

Parallel recombinative reinforcement learning (Extended abstract) [chapter]

Aristidis Likas, Konstantinos Blekas, Andreas Stafylopatis
1995 Lecture Notes in Computer Science  
The Recombinative Scheme According to the PRRL approach, each population member i is a vector Pi of probabilities Pij (i = 1, ...  ...  Then a sampling procedure is performed and p points Y~ = (Yil,..., Yin) (i = 1,... ,p) of the function space are generated with Bernoulli selection using the corresponding probabilities Pij.  ... 
doi:10.1007/3-540-59286-5_75 fatcat:4kcsdeab4ngxdiikbtjkkbthxm

Datalog Automata Extended Abstract [chapter]

Bernard LANG
1988 Proceedings of the Third International Conference on Data and Knowledge Bases  
By extending to these automata a dynamic programming technique developed for PDAs in context-free parsing, we obtain a general and simple technique for constructing efficient polynomial query evaluators  ...  We propose a new computational paradigm for the evaluation of recursive Datalog queries, which is based on a pushdown automaton (PDA) model.  ...  The author acknowledges with pleasure the time L.  ... 
doi:10.1016/b978-1-4832-1313-2.50036-6 dblp:conf/jcdkb/Lang88 fatcat:cglmszdjbzdbxgxdvbui2pfjli

Fuzzy Private Matching (Extended Abstract) [article]

Łukasz Chmielewski, Jaap-Henk Hoepman
2007 arXiv   pre-print
The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all.  ...  In certain applications it would be useful to have a private matching protocol that reports a match even if two elements are only similar instead of equal.  ...  The probability that a random value from R is a correct share is negligible (with respect to a security parameter k).  ... 
arXiv:0710.5425v1 fatcat:dkblydoa7venppbfw6jgyzyyp4

Knowing-How under Uncertainty (Extended Abstract)

Pavel Naumov, Jia Tao
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
The main technical results are soundness, completeness, and incompleteness of the proposed logical system with respect to two classes of semantics.  ...  This article combines these two research lines by introducing a bimodal logic containing knowledge and know-how modalities, both labeled with a degree of uncertainty.  ...  scale up the algorithm while improving privacy guarantees, and • data augmentation for non-CE family models to generalize our approach to a broad class of models, which we describe in the full journal  ... 
doi:10.24963/ijcai.2020/705 dblp:conf/ijcai/FouldsPCW20 fatcat:w7hco3e6izewzafpsiy5nmuk5y

Predicting Strategic Behavior from Free Text (Extended Abstract)

Omer Ben-Porat, Lital Kuchy, Sharon Hirsch, Guy Elad, Roi Reichart, Moshe Tennenholtz
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
Particularly, we introduce the following question: can free text expressed in natural language serve for the prediction of action selection in an economic context, modeled as a game?  ...  The connection between messaging and action is fundamental both to web applications, such as web search and sentiment analysis, and to economics.  ...  Moreover, it "only" extends Boolean logic with probabilities, thus it preserves the original logical semantics.  ... 
doi:10.24963/ijcai.2020/688 dblp:conf/ijcai/RaedtDMM20 fatcat:kbp4p2slsrculnqg2ig2dvchde

Fuzzy Private Matching (Extended Abstract)

Lukasz Chmielewski, Jaap-Henk Hoepman
2008 2008 Third International Conference on Availability, Reliability and Security  
The client wants to privately compute the intersection of these two sets: he learns which elements he has in common with the server (and nothing more), while the server gains no information at all.  ...  In certain applications it would be useful to have a fuzzy private matching protocol that reports a match even if two elements are only similar instead of equal.  ...  Otherwise (if Y j does not match with any element from X) all the values sent to the client contain a random blinding element r (and therefore their decryptions are in Y with negligible probability).  ... 
doi:10.1109/ares.2008.170 dblp:conf/IEEEares/ChmielewskiH08 fatcat:of2ofpydrve23j5pdgd2wo5g7y

Learning agents for uncertain environments (extended abstract)

Stuart Russell
1998 Proceedings of the eleventh annual conference on Computational learning theory - COLT' 98  
The architecture uses reinforcement learning together with a method for representing temporal processes as graphical models.  ...  This seems to be a very interesting problem for the COLT, UAI, and ML communities, and has been addressed in econometrics under the heading of structural estimation of Markov decision processes.  ...  Neither approach is likely to scale up to situations with large numbers of state variables and long-term temporal dependencies.  ... 
doi:10.1145/279943.279964 dblp:conf/colt/Russell98 fatcat:bnv35r7dzfdzfdhch3qea6amdy

Full Abstraction for PCF (extended abstract) [chapter]

Samson Abramsky, Pasquale Malacaria, Radha Jagadeesan
1994 Lecture Notes in Computer Science  
On the one hand, sequentiality refers to a computational process extended over time, not a mere function; on the other hand, we want to capture just those sequential computations *  ...  The usual formulation is that one wants a "semantic characterization" of the fully abstract model (by which we mean the inequationally fully abstract order-extensional model, which Milner proved to be  ...  This argument is extended to general strings s ∈ σ; τ by an induction on |s|.  ... 
doi:10.1007/3-540-57887-0_87 fatcat:lmhjsi5t4fevrjhhb6gzzp3tba

Private information storage (extended abstract)

Rafail Ostrovsky, Victor Shoup
1997 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing - STOC '97  
In fact, we show a general information-theoretic reduction from reading and writing to any read-only scheme that preserves the communication complexity of the read scheme to within a poly-logarithmic factor  ...  This paper deals with the problem of e ciently and privately storing and retrieving information that is distributively maintained in several databases that do not communicate with one another.  ...  Comparison with Previous Work The general approach of distributing information to maintain privacy has been used in many situations, including the previous work on reading from a distributed database CGKS  ... 
doi:10.1145/258533.258606 dblp:conf/stoc/OstrovskyS97 fatcat:rqudnxi7mjcufdfwnh3iatvcu4
« Previous Showing results 1 — 15 out of 482,974 results