A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Threshold Queries in Theory and in the Wild
[article]
2021
arXiv
pre-print
In this paper, we present a deep theoretical analysis of threshold query evaluation and show that thresholds can be used to significantly improve the asymptotic bounds of state-of-the-art query evaluation ...
To the best of our knowledge, threshold queries have been largely disregarded in the research literature, which is surprising considering how common they are in practice. ...
We thank Andrea Calì, Leonid Libkin, Victor Lee, Juan Sequeda, Bryon Jacob, and Michael Schmidt for their useful comments and early feedback. ...
arXiv:2106.15703v2
fatcat:cmhu3aaoffggbltngg326vchne
Biodiversity Prospecting Over Time and Under Uncertainty: A Theory of Sorts
2013
Social Science Research Network
Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesen Nutzungsbedingungen die in der dort genannten ...
To Use or Not to Use a Previously Discarded Organism In order to answer the above query, we must first express this query in mathematical terms. ...
In words, this simply means that for the wild organism with threshold quality level f', our PF is indifferent between the two actions of producing the drug in question and continuing the search for wild ...
doi:10.2139/ssrn.2338541
fatcat:niya44ub5re4dbdoadhenpyl7a
Applying information foraging theory to understand user interaction with content-based image retrieval
2010
Proceeding of the third symposium on Information interaction in context - IIiX '10
To our best knowledge, this is the first principled user classification model in CBIR verified by a formal and systematic qualitative analysis of extensive user interaction data. ...
The paper proposes an ISE (Information goal, Search strategy, Evaluation threshold) user classification model based on Information Foraging Theory for understanding user interaction with content-based ...
Information Foraging Theory (IFT) was developed by Pirolli et al. [11] [12] [13] , which suggests the way humans seek information is like the way wild animals gathering food. ...
doi:10.1145/1840784.1840805
dblp:conf/iiix/0002MSUR10
fatcat:yiouwewkkrclbix7vqwyknt2he
Page 4628 of Mathematical Reviews Vol. , Issue 2003f
[page]
2003
Mathematical Reviews
Linear and polynomial threshold functions are introduced next.
The first set of results is about the number of threshold func- tions, upper and lower bounds, and asymptotic results. ...
“Query by committee” (QBC) of Seung, Opper, and Sompolinsky is an active learning algorithm for a variant of the PAC model. ...
Grouping search-engine returned citations for person-name queries
2004
Proceedings of the 6th annual ACM international workshop on Web information and data management - WIDM '04
In this thesis we present a technique to group search-engine returned citations for person-name queries, such that the search-engine returned citations in each group belong to the same person. ...
Using a threshold, we apply a grouping algorithm on the final confidence matrix. ...
In the case of Larry Wilde, for example, we need to merge a group of 41 citations, 2 groups of two citations, and 2 groups of one citation in one group. ...
doi:10.1145/1031453.1031472
dblp:conf/widm/Al-KamhaE04
fatcat:gu7jga66nbcddnrgqveageogde
BEST: a novel computational approach for comparing gene expression patterns from early stages of Drosophila melanogaster development
2002
Genetics
gene expression pattern images and information on the associated genotypes and probes. ...
germ-band elongation); similarities and differences in gene expression patterns in these early stages have extensive developmental effects. ...
F., and R. M. Cesar, 2000 Shape Analysis and Classification: are encouraging and are in preparation for publication Theory and Practice. CRC Press, Cleveland. ...
pmid:12524369
pmcid:PMC1462359
fatcat:kia6ppnruzcx5a43p4blnv2ylq
Signalling in gene silencing
1999
Trends in Plant Science
Acknowledgements Our thanks to Neil Emans for critical reading of the manuscript.
Michael Wassenegger* and Thierry ...
In this context, the cohesion theory of water movement in plants has been variously ascribed to Josef Böhm 1 , Henry H. Dixon and John Joly 2 , and Eugen Askenasy 3 . ...
After citing Newton's Optics (2nd edn, 1717; query 31, in which mercury is lifted 60-70 inches in a barometer tube by cohesion compared with a water pillar of over 60 feet) Hales wrote, 'And by the same ...
doi:10.1016/s1360-1385(99)01416-8
pmid:10366874
fatcat:vevqxa4tcjbrtouxl76iffykiy
Variations in Thermal Sensitivity
1961
Science
The gap between a burnsi and a wild-type individual is almost closed, leading to the perplex-
ing query: How many dorsal spots
must an individual contain before it is classified as a burnsi or a_ wild- ...
These were obtained in two sessions, one in the morning and the other in the after- noon.
Two criteria of “threshold” were used. ...
doi:10.1126/science.134.3472.104
pmid:17807394
fatcat:3ov4c2nxxfhlxnlqd5fjvsflfq
Applying fuzzy databases and FSQL to the management of rural accommodation
2003
Tourism Management
Database management systems used in information systems for the tourism industry and based on SQL are flexible insofar as they allow queries regarding the data stored in them. ...
Rather, the agent has to make different queries about available trips and then has to summarise and adapt them to the needs of the clients. ...
It could be more useful to use CDEG(*) to obtain the degree of fulfilment of each tuple in the whole condition (considering all its attributes, not just one). * Wild card %: This is similar to the wild ...
doi:10.1016/s0261-5177(02)00108-5
fatcat:ie5ahedvlncdfmjbnmyi4iidgm
DiGSNP: a web tool for Disease-Gene-SNP hierarchical prioritization
2012
EMBnet journal
., Sevilla and TIN2009-13489 of DGICT, Madrid ...
Selected SNPs are ordered depending on the difference of similarity between the mutated and wild-type alleles. ...
to a known TFBS above a provided threshold. ...
doi:10.14806/ej.18.b.556
fatcat:yid4p4mxjfflbjjzlidpaxx73a
Applying fuzzy databases and FSQL to the management of rural accommodation
2002
Tourism Management
Database management systems used in information systems for the tourism industry and based on SQL are flexible insofar as they allow queries regarding the data stored in them. ...
Rather, the agent has to make different queries about available trips and then has to summarise and adapt them to the needs of the clients. ...
It could be more useful to use CDEG(*) to obtain the degree of fulfilment of each tuple in the whole condition (considering all its attributes, not just one). * Wild card %: This is similar to the wild ...
doi:10.1016/s0261-5177(02)00028-6
fatcat:2w3tcsvj6nhjhfigjxudnwz5yu
Right of Inference: Nearest Rectangle Learning Revisited
[chapter]
2006
Lecture Notes in Computer Science
In Nearest Rectangle (NR) learning, training instances are generalized into hyperrectangles and a query is classified according to the class of its nearest rectangle. ...
Rectangles having the right of inference are compact, conservative, and good for making local decisions. Experiments on benchmark datasets validate the effectiveness of the proposed approach. ...
In (a), the rectangles make "wild", inappropriate inferences and the query q is classified as ; In (b), the rectangles generalize the same training instances in a compact and conservative fashion, having ...
doi:10.1007/11871842_62
fatcat:xt2thzacjrazbmgh7urakajxqi
Page 5008 of Mathematical Reviews Vol. , Issue 96h
[page]
1996
Mathematical Reviews
The threshold elements are grouped in layers, and the output of one layer is the input of the next layer. ...
Toda, in Proceedings of the Eighth Annual Structure in Complexity Theory Conference (San Diego, CA, 1993), 147-155, IEEE Comput. Soc. ...
Toward Open-Set Face Recognition
2017
2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
Our open-set identification protocol is based on the canonical labeled faces in the wild (LFW) dataset. ...
In this paper, we address the widespread misconception that thresholding verification-like scores is a good way to solve the open-set face identification problem, by formulating an open-set face identification ...
Acknowledgment This research is based upon work supported in part by NSF IIS-1320956 and in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity ...
doi:10.1109/cvprw.2017.85
dblp:conf/cvpr/GuntherCRB17
fatcat:2eg4bunc6zd25hrwkb5vdi5fmy
Toward Open-Set Face Recognition
[article]
2017
arXiv
pre-print
Our open-set identification protocol is based on the canonical labeled faces in the wild (LFW) dataset. ...
In this paper, we address the widespread misconception that thresholding verification-like scores is a good way to solve the open-set face identification problem, by formulating an open-set face identification ...
Acknowledgment This research is based upon work supported in part by NSF IIS-1320956 and in part by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity ...
arXiv:1705.01567v2
fatcat:gchycybzbjgqrkdwvymow6p3aa
« Previous
Showing results 1 — 15 out of 8,827 results