A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using Introspection to Collect Provenance in R
2018
Informatics
It does this using R's powerful introspection functions and by parsing R statements prior to sending them to the interpreter so it knows what provenance to collect. ...
In this paper, we provide details about the provenance RDataTracker collects and the mechanisms used to collect it. ...
We also would like to thank the following people who contributed to the implementation of RDataTracker: Elizabeth Fong, Connor Gregorich-Trevor, Alex Liu, Yada Pruksachatkun, and Moe Pwint Phyu. ...
doi:10.3390/informatics5010012
fatcat:s3vrnv2c5najhajy7sfqyges2y
In this paper, we describe our vision of a uni ed provenance and metadata management system to support lifecycle management of complex collaborative data science workows. ...
As data-driven methods are becoming pervasive in a wide variety of disciplines, there is an urgent need to develop scalable and sustainable tools to simplify the process of data science, to make it easier ...
Data Collection Layer is a thin layer on top of the DVCS that is used to capture the provenance and metadata information. ...
doi:10.1145/3077257.3077267
dblp:conf/sigmod/MiaoCD17
fatcat:ofr25bj2trewri4ksbwtq3wxgu
ProvDB: A System for Lifecycle Management of Collaborative Analysis Workflows
[article]
2016
arXiv
pre-print
to keep track of the analyses being performed and datasets being generated, and to enable introspection of the workflows. ...
In this paper, we describe our vision of a unified provenance and metadata management system to support lifecycle management of complex collaborative data science workflows. ...
PROVDB Data Collection Layer is a thin layer on top of the DVCS (in our case, git) that is used to capture the provenance and metadata information. ...
arXiv:1610.04963v1
fatcat:lgyzcdt2knfnfjgea7ufzxpx4y
ProvDB: Provenance-enabled Lifecycle Management of Collaborative Data Analysis Workflows
2018
IEEE Data Engineering Bulletin
In this article, we present an overview of a unified provenance and metadata management system, called PROVDB, that we have been building to support lifecycle management of complex collaborative data science ...
PROVDB captures a large amount of fine-grained information about the analysis processes and versioned data artifacts in a semi-passive manner using a flexible and extensible ingestion mechanism; provides ...
In particular, there are many potential ways to use the rich provenance and context metadata that PROVDB collects to answer explanation queries to understand the origins of a piece of data or introspection ...
dblp:journals/debu/0001D18
fatcat:ybx7j6hvnjanbjnmz7wyrmb2te
Introspective Perception: Learning to Predict Failures in Vision Systems
[article]
2016
arXiv
pre-print
In this paper, we take a small step in this direction and propose a generic framework for introspective behavior in perception systems. ...
This motivates the need to build systems that have situational awareness to assess how qualified they are at that moment to make a decision. We call this self-evaluating capability as introspection. ...
We collected a dataset -BIRD Dataset, as detailed in Section V for training and validation of our introspection model. ...
arXiv:1607.08665v1
fatcat:psykvp2xpzhtfkm6tgzna7g67a
Case Based Reasoning as a Model for Cognitive Artificial Intelligence
[chapter]
2018
Lecture Notes in Computer Science
Case Based Reasoning (CBR) systems naturally capture knowledge as experiences in memory and they are able to learn new experiences to retain in their memory. ...
Our idea is to embed and exploit cognitive functionality such as insight, intuition and curiosity within CBR to drive robust, and even explainable, intelligence that will achieve problemsolving in challenging ...
Agnar Aamodt wishes to thank Enric Plaza for discussions of CBR, analogy, and cognition relevant to this paper, in preparing an invited talk at ICCBR 2017. ...
doi:10.1007/978-3-030-01081-2_5
fatcat:spwkpikuhbh7pnihfuswp5v77a
Serving the readers of scholarly documents: A grand challenge for the introspective digital library
2015
2015 International Conference on Big Data and Smart Computing (BIGCOMP)
The
of its collection and can facilitate its use for its readership. ...
Body Text
the simple inventory of word tokens used in the collection; it
suggests that the IDL either infers or has access to knowledge Keyphrases and Metadata. ...
doi:10.1109/35021bigcomp.2015.7072807
dblp:conf/bigcomp/Kan15
fatcat:rmtqrpteojgpbfexkal5frqdya
How to Share Knowledge by Gossiping
[chapter]
2016
Lecture Notes in Computer Science
Given n agents each of which has a secret (a fact not known to anybody else), the classical version of the gossip problem is to achieve shared knowledge of all secrets in a minimal number of phone calls ...
OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. ...
Acknowledgements We would like to acknowledge several discussions about the gossip problem at the inspiring August 2015 workshop "To be announced" in Leiden, in particular with Hans van Ditmarsch, Jan ...
doi:10.1007/978-3-319-33509-4_20
fatcat:5f56tzhi7nf2dg736ocv4gcbye
Page 928 of American Anthropologist Vol. 76, Issue 4
[page]
1974
American Anthropologist
R. Ross on squishes has started to show how variability may be dealt with, and in fact must be, with- in the theoretical confines of generative semantics. ...
In this way, it is sug- gested, variability will be captured as it ought to be, and hard data will replace woolly introspection. ...
Page 1040 of Mathematical Reviews Vol. , Issue 94b
[page]
1994
Mathematical Reviews
Faces of this polycone represent inequalities proven to hold among the argument sizes. ...
In this way canonical models may be computed. In order to cope with inconsistencies the semantics does not use a three-valued logic. Instead copies of clauses are introduced. ...
On the Complexity of Two-Agent Justification Logic
[chapter]
2014
Lecture Notes in Computer Science
We consider two-agent versions of other justification logics as well as ways to combine two justification logics. ...
For most of these cases we prove that the upper complexity bound established for the single-agent cases are maintained: these logics' derivability problem is in the second step of the polynomial hierarchy ...
Truth in the model is defined in the following way: It can be proven that each of these logics is sound and complete with respect to its M-models. ...
doi:10.1007/978-3-319-09764-0_1
fatcat:wfs27naawvfxzms7nk2a4lc5nm
Experiencing film: Subjective personal introspection and popular film consumption
2016
International Journal of Research in Marketing
For that reason, we use a modified version of Subjective Personal Introspection (SPI) as a research method, which offers us full access to what A C C E P T E D M A N U S C R I P T
ACCEPTED MANUSCRIPT ...
Data Collection The introspective data were collected concurrently over a period of two weeks (26 November 2012 to 9 December 2012). ...
A C C E P T E D M A N U S C R I P T ...
doi:10.1016/j.ijresmar.2015.08.005
fatcat:gxca7blgurg7ro4voxqizxyewu
Efficient runtime-enforcement techniques for policy weaving
2014
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2014
In this paper, we examine the strategy of using a combination of transactional introspection and statement indirection to implement runtime enforcement in a policy-weaving system. ...
Transactional introspection allows the state resulting from the execution of a statement to be examined and, if the policy would be violated, suppressed. ...
e 7 if ispecteffective is null then 3 Let ispecteffective be ispectall 4 else 5 8 Evaluate expression r = e 9 else 10 Evaluate expression introspect(ispecteffective){r = e} 11 Return r ...
doi:10.1145/2635868.2635907
dblp:conf/sigsoft/JoinerRJDG14
fatcat:akfc4uarjba7talfwksvcedbuq
The validity of individual Rorschach variables: Systematic reviews and meta-analyses of the comprehensive system
2013
Psychological bulletin
., observer ratings, psychiatric diagnosis), the mean validity was r ϭ .27 (k ϭ 770) as compared to r ϭ .08 (k ϭ 386) across 42 meta-analyses examining variables against introspectively assessed criteria ...
We discuss study limitations and the implications for research and clinical practice, including the importance of using different methods in order to improve our understanding of people. ...
differences in the quality of data collection efforts (Meyer, 2001) . ...
doi:10.1037/a0029406
pmid:22925137
fatcat:5pnnatzwpverbgvfvmw5jvolk4
Adapting Behavior via Intrinsic Reward: A Survey and Empirical Study
2020
The Journal of Artificial Intelligence Research
The question we tackle in this paper is how to sculpt the stream of experience—how to adapt the learning system's behavior—to optimize the learning of a collection of value functions. ...
A simple answer is to compute an intrinsic reward based on the statistics of each auxiliary learner, and use reinforcement learning to maximize that intrinsic reward. ...
We would like to thank Rich Sutton for his ideas and insights that shaped this project early on. We would also like to thank ...
doi:10.1613/jair.1.12087
fatcat:5zis6nhqp5blhdnxmyt5zyr36q
« Previous
Showing results 1 — 15 out of 7,546 results