7,546 Hits in 4.5 sec

Using Introspection to Collect Provenance in R

Barbara Lerner, Emery Boose, Luis Perez
2018 Informatics  
It does this using R's powerful introspection functions and by parsing R statements prior to sending them to the interpreter so it knows what provenance to collect.  ...  In this paper, we provide details about the provenance RDataTracker collects and the mechanisms used to collect it.  ...  We also would like to thank the following people who contributed to the implementation of RDataTracker: Elizabeth Fong, Connor Gregorich-Trevor, Alex Liu, Yada Pruksachatkun, and Moe Pwint Phyu.  ... 
doi:10.3390/informatics5010012 fatcat:s3vrnv2c5najhajy7sfqyges2y


Hui Miao, Amit Chavan, Amol Deshpande
2017 Proceedings of the 2nd Workshop on Human-In-the-Loop Data Analytics - HILDA'17  
In this paper, we describe our vision of a uni ed provenance and metadata management system to support lifecycle management of complex collaborative data science workows.  ...  As data-driven methods are becoming pervasive in a wide variety of disciplines, there is an urgent need to develop scalable and sustainable tools to simplify the process of data science, to make it easier  ...  Data Collection Layer is a thin layer on top of the DVCS that is used to capture the provenance and metadata information.  ... 
doi:10.1145/3077257.3077267 dblp:conf/sigmod/MiaoCD17 fatcat:ofr25bj2trewri4ksbwtq3wxgu

ProvDB: A System for Lifecycle Management of Collaborative Analysis Workflows [article]

Hui Miao, Amit Chavan, Amol Deshpande
2016 arXiv   pre-print
to keep track of the analyses being performed and datasets being generated, and to enable introspection of the workflows.  ...  In this paper, we describe our vision of a unified provenance and metadata management system to support lifecycle management of complex collaborative data science workflows.  ...  PROVDB Data Collection Layer is a thin layer on top of the DVCS (in our case, git) that is used to capture the provenance and metadata information.  ... 
arXiv:1610.04963v1 fatcat:lgyzcdt2knfnfjgea7ufzxpx4y

ProvDB: Provenance-enabled Lifecycle Management of Collaborative Data Analysis Workflows

Hui Miao, Amol Deshpande
2018 IEEE Data Engineering Bulletin  
In this article, we present an overview of a unified provenance and metadata management system, called PROVDB, that we have been building to support lifecycle management of complex collaborative data science  ...  PROVDB captures a large amount of fine-grained information about the analysis processes and versioned data artifacts in a semi-passive manner using a flexible and extensible ingestion mechanism; provides  ...  In particular, there are many potential ways to use the rich provenance and context metadata that PROVDB collects to answer explanation queries to understand the origins of a piece of data or introspection  ... 
dblp:journals/debu/0001D18 fatcat:ybx7j6hvnjanbjnmz7wyrmb2te

Introspective Perception: Learning to Predict Failures in Vision Systems [article]

Shreyansh Daftry, Sam Zeng, J. Andrew Bagnell, Martial Hebert
2016 arXiv   pre-print
In this paper, we take a small step in this direction and propose a generic framework for introspective behavior in perception systems.  ...  This motivates the need to build systems that have situational awareness to assess how qualified they are at that moment to make a decision. We call this self-evaluating capability as introspection.  ...  We collected a dataset -BIRD Dataset, as detailed in Section V for training and validation of our introspection model.  ... 
arXiv:1607.08665v1 fatcat:psykvp2xpzhtfkm6tgzna7g67a

Case Based Reasoning as a Model for Cognitive Artificial Intelligence [chapter]

Susan Craw, Agnar Aamodt
2018 Lecture Notes in Computer Science  
Case Based Reasoning (CBR) systems naturally capture knowledge as experiences in memory and they are able to learn new experiences to retain in their memory.  ...  Our idea is to embed and exploit cognitive functionality such as insight, intuition and curiosity within CBR to drive robust, and even explainable, intelligence that will achieve problemsolving in challenging  ...  Agnar Aamodt wishes to thank Enric Plaza for discussions of CBR, analogy, and cognition relevant to this paper, in preparing an invited talk at ICCBR 2017.  ... 
doi:10.1007/978-3-030-01081-2_5 fatcat:spwkpikuhbh7pnihfuswp5v77a

Serving the readers of scholarly documents: A grand challenge for the introspective digital library

Min-Yen Kan
2015 2015 International Conference on Big Data and Smart Computing (BIGCOMP)  
The of its collection and can facilitate its use for its readership.  ...  Body Text the simple inventory of word tokens used in the collection; it suggests that the IDL either infers or has access to knowledge Keyphrases and Metadata.  ... 
doi:10.1109/35021bigcomp.2015.7072807 dblp:conf/bigcomp/Kan15 fatcat:rmtqrpteojgpbfexkal5frqdya

How to Share Knowledge by Gossiping [chapter]

Andreas Herzig, Faustine Maffre
2016 Lecture Notes in Computer Science  
Given n agents each of which has a secret (a fact not known to anybody else), the classical version of the gossip problem is to achieve shared knowledge of all secrets in a minimal number of phone calls  ...  OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible.  ...  Acknowledgements We would like to acknowledge several discussions about the gossip problem at the inspiring August 2015 workshop "To be announced" in Leiden, in particular with Hans van Ditmarsch, Jan  ... 
doi:10.1007/978-3-319-33509-4_20 fatcat:5f56tzhi7nf2dg736ocv4gcbye

Page 928 of American Anthropologist Vol. 76, Issue 4 [page]

1974 American Anthropologist  
R. Ross on squishes has started to show how variability may be dealt with, and in fact must be, with- in the theoretical confines of generative semantics.  ...  In this way, it is sug- gested, variability will be captured as it ought to be, and hard data will replace woolly introspection.  ... 

Page 1040 of Mathematical Reviews Vol. , Issue 94b [page]

1994 Mathematical Reviews  
Faces of this polycone represent inequalities proven to hold among the argument sizes.  ...  In this way canonical models may be computed. In order to cope with inconsistencies the semantics does not use a three-valued logic. Instead copies of clauses are introduced.  ... 

On the Complexity of Two-Agent Justification Logic [chapter]

Antonis Achilleos
2014 Lecture Notes in Computer Science  
We consider two-agent versions of other justification logics as well as ways to combine two justification logics.  ...  For most of these cases we prove that the upper complexity bound established for the single-agent cases are maintained: these logics' derivability problem is in the second step of the polynomial hierarchy  ...  Truth in the model is defined in the following way: It can be proven that each of these logics is sound and complete with respect to its M-models.  ... 
doi:10.1007/978-3-319-09764-0_1 fatcat:wfs27naawvfxzms7nk2a4lc5nm

Experiencing film: Subjective personal introspection and popular film consumption

Andrew Hart, Finola Kerrigan, Dirk vom Lehn
2016 International Journal of Research in Marketing  
For that reason, we use a modified version of Subjective Personal Introspection (SPI) as a research method, which offers us full access to what A C C E P T E D M A N U S C R I P T ACCEPTED MANUSCRIPT  ...  Data Collection The introspective data were collected concurrently over a period of two weeks (26 November 2012 to 9 December 2012).  ...  A C C E P T E D M A N U S C R I P T  ... 
doi:10.1016/j.ijresmar.2015.08.005 fatcat:gxca7blgurg7ro4voxqizxyewu

Efficient runtime-enforcement techniques for policy weaving

Richard Joiner, Thomas Reps, Somesh Jha, Mohan Dhawan, Vinod Ganapathy
2014 Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014  
In this paper, we examine the strategy of using a combination of transactional introspection and statement indirection to implement runtime enforcement in a policy-weaving system.  ...  Transactional introspection allows the state resulting from the execution of a statement to be examined and, if the policy would be violated, suppressed.  ...  e 7 if ispecteffective is null then 3 Let ispecteffective be ispectall 4 else 5 8 Evaluate expression r = e 9 else 10 Evaluate expression introspect(ispecteffective){r = e} 11 Return r  ... 
doi:10.1145/2635868.2635907 dblp:conf/sigsoft/JoinerRJDG14 fatcat:akfc4uarjba7talfwksvcedbuq

The validity of individual Rorschach variables: Systematic reviews and meta-analyses of the comprehensive system

Joni L. Mihura, Gregory J. Meyer, Nicolae Dumitrascu, George Bombel
2013 Psychological bulletin  
., observer ratings, psychiatric diagnosis), the mean validity was r ϭ .27 (k ϭ 770) as compared to r ϭ .08 (k ϭ 386) across 42 meta-analyses examining variables against introspectively assessed criteria  ...  We discuss study limitations and the implications for research and clinical practice, including the importance of using different methods in order to improve our understanding of people.  ...  differences in the quality of data collection efforts (Meyer, 2001) .  ... 
doi:10.1037/a0029406 pmid:22925137 fatcat:5pnnatzwpverbgvfvmw5jvolk4

Adapting Behavior via Intrinsic Reward: A Survey and Empirical Study

Cam Linke, Nadia M. Ady, Martha White, Thomas Degris, Adam White
2020 The Journal of Artificial Intelligence Research  
The question we tackle in this paper is how to sculpt the stream of experience—how to adapt the learning system's behavior—to optimize the learning of a collection of value functions.  ...  A simple answer is to compute an intrinsic reward based on the statistics of each auxiliary learner, and use reinforcement learning to maximize that intrinsic reward.  ...  We would like to thank Rich Sutton for his ideas and insights that shaped this project early on. We would also like to thank  ... 
doi:10.1613/jair.1.12087 fatcat:5zis6nhqp5blhdnxmyt5zyr36q
« Previous Showing results 1 — 15 out of 7,546 results