派博傳思國際中心

標題: Titlebook: Inductive Logic Programming; 11th International C Céline Rouveirol,Michéle Sebag Conference proceedings 2001 Springer-Verlag Berlin Heidelb [打印本頁]

作者: 里程表    時間: 2025-3-21 17:04
書目名稱Inductive Logic Programming影響因子(影響力)




書目名稱Inductive Logic Programming影響因子(影響力)學(xué)科排名




書目名稱Inductive Logic Programming網(wǎng)絡(luò)公開度




書目名稱Inductive Logic Programming網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Inductive Logic Programming被引頻次




書目名稱Inductive Logic Programming被引頻次學(xué)科排名




書目名稱Inductive Logic Programming年度引用




書目名稱Inductive Logic Programming年度引用學(xué)科排名




書目名稱Inductive Logic Programming讀者反饋




書目名稱Inductive Logic Programming讀者反饋學(xué)科排名





作者: Exterior    時間: 2025-3-21 23:49

作者: ITCH    時間: 2025-3-22 04:18
Efficient Cross-Validation in ILP,iscuss two issues: a) the existence of dependencies between parts of a query that limit the obtainable efficiency improvements and b) the combination of parallel cross-validation with query-packs. Tentative solutions are proposed and evaluated experimentally.
作者: 有其法作用    時間: 2025-3-22 07:50
A Genetic Algorithm for Propositionalization, individual, and general set-based operators to alter one partition or to mix two ones. For propositionalization, operators are extended to change not only the partition but also the associated numeric constraints.
作者: 沙草紙    時間: 2025-3-22 09:23

作者: 寬容    時間: 2025-3-22 13:24

作者: Intellectual    時間: 2025-3-22 19:25

作者: 使聲音降低    時間: 2025-3-23 00:55

作者: Acetaminophen    時間: 2025-3-23 01:45

作者: lanugo    時間: 2025-3-23 07:47
Towards Combining Inductive Logic Programming with Bayesian Networks,ponents of Bayesian logic programs. More precisely, we show how to combine the ILP setting . with score-based techniques for learning Bayesian networks. Thus, the paper positively answers Koller and Pfeffer’s question, whether techniques from ILP could help to learn the logical component of first order probabilistic models.
作者: enterprise    時間: 2025-3-23 16:10
A Refinement Operator for Theories, due to the commutativity of refinement operations while preserving weak completeness as well as a limited form of flexibility. The refinement operator presented in this paper represents a first step towards constructing more efficient and . ILP systems with precise theoretical guarantees.
作者: 社團    時間: 2025-3-23 21:34

作者: Glucose    時間: 2025-3-24 01:33
Discovering Associations between Spatial Objects: An ILP Application,atial objects. It operates on a deductive relational database set up by selecting and transforming data stored in the underlying spatial database. Preliminary experimental results have been obtained by running SPADA on geo-referenced census data of Manchester Stockport, UK.
作者: 噴出    時間: 2025-3-24 04:51
-Subsumption in a Constraint Satisfaction Perspective, this region has been shown of utmost relevance to ILP [.]. Experiments on artificial .-subsumption problems designed to illustrate the phase transition phenomenon, show that . is faster by several orders of magnitude than previous .-subsumption algorithms, within and outside the PT region.
作者: 方舟    時間: 2025-3-24 08:24
ss .: improving over common numerical approaches yielding exponential sequential time or parallel polynomial time. Our results build on efficient algorithms and their analyses for real polynomial, matrix and operator powering which do not occur in the discrete case and may be of independent interest
作者: 惡意    時間: 2025-3-24 12:41

作者: nerve-sparing    時間: 2025-3-24 17:45
Rodrigo Basilio,Gerson Zaverucha,Valmir C. Barbosaunning time ., that is, they are . with the parameter .. One of our main subroutines to obtain these algorithms is an . algorithm for . edge connected ., which could be of an independent interest. Finally, we also show that such an algorithm is not possible for ..
作者: Forsake    時間: 2025-3-24 22:16
Agnès Braud,Christel Vrainractically solvable problems and the practically unsolvable ones partially reminds of the never-ending search for the definition of “l(fā)ife” in biology or for the definitions of matter and energy in physics. Can the search for the formal notion of “practical solvability” also become a never-ending sto
作者: 詞根詞綴法    時間: 2025-3-25 03:00
Martin Eineborg,Henrik Bostr?me, we show that generating all vertices of a polyhedron, given by its facets, is NP-complete (while the complexity status is still open in case of the polytopes, that is, bounded polyhedra). This problem is reduced to generating all negative cycles of a weighted digraph, which is NP-complete (for gr
作者: 小故事    時間: 2025-3-25 03:39

作者: Baffle    時間: 2025-3-25 10:51
Katsumi Inouewith nonlinear . and random .. All above lower bounds are randomized..The main contribution of this paper is the simpler proof of the exponential lower bound of the Goldreich’s function inversion by myopic DPLL algorithms. A dependency graph in our construction may be based on an arbitrary expander,
作者: 熟練    時間: 2025-3-25 12:38
Nico Jacobs,Hendrik Blockeelically restricted first-order logic, and another characterization in terms of a finite set of relations . that allow primitive positive definitions of all other relations in the class. We also present a subclass of max-closed constraints where the CSP is in .; this class generalizes the class of max
作者: Insatiable    時間: 2025-3-25 19:50

作者: 向下五度才偏    時間: 2025-3-25 21:26
Kristian Kersting,Luc De Raedtally, we prove the width hierarchy for complexity classes of Boolean functions for bounded error probabilistic OBDDs. And using “reordering” method we extend a hierarchy for .-OBDD of polynomial size, for .. Moreover, we proved a similar hierarchy for bounded error probabilistic .-OBDD. And for dete
作者: 時代    時間: 2025-3-26 01:52

作者: habile    時間: 2025-3-26 07:25

作者: Rotator-Cuff    時間: 2025-3-26 10:06
Donato Malerba,Francesca A. Lisilization techniques to provide meaningful and comparable results from the deployment of scalable solutions, demonstrating their benefits and drawbacks. Towards this direction, we present a use case for deploying cybersecurity exercises that requires less effort and moderate system resources. By usin
作者: DENT    時間: 2025-3-26 13:06

作者: 勉勵    時間: 2025-3-26 17:23
Miloslav Nepillization techniques to provide meaningful and comparable results from the deployment of scalable solutions, demonstrating their benefits and drawbacks. Towards this direction, we present a use case for deploying cybersecurity exercises that requires less effort and moderate system resources. By usin
作者: Certainty    時間: 2025-3-26 23:06

作者: goodwill    時間: 2025-3-27 04:14

作者: creatine-kinase    時間: 2025-3-27 09:05
Jan Struyf,Hendrik Blockeelure addresses the conditions required for offering effective cyber insurance for interoperable service chains cutting across application domains and jurisdictions. CyberSure platform aims to tackle the challenges of offering cyber insurance for interoperable service chains cutting across application
作者: Tailor    時間: 2025-3-27 12:29

作者: 收到    時間: 2025-3-27 16:53
Application of Pruning Techniques for Propositional Learning to Progol,ess of the proposed algorithms. The results show that the proposed algorithms reduce the number of candidate hypotheses to be evaluated as well as the computational time for a certain class of problems.
作者: 地牢    時間: 2025-3-27 18:27
René Quiniou,Marie-Odile Cordier,Guy Carrault,Feng Wang secure software development, malicious code analysis as well as security testing platforms. . From the MSTEC Workshop 7 full papers out of 15 submissions are i978-3-030-42050-5978-3-030-42051-2Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 滔滔不絕地說    時間: 2025-3-28 01:25

作者: 深淵    時間: 2025-3-28 05:54

作者: 多山    時間: 2025-3-28 09:31

作者: Measured    時間: 2025-3-28 11:29
Classifying Uncovered Examples by Rule Stretching,lass to the uncovered examples, which is the standard method, a novel method is presented that minimally generalises the rules to include the uncovered examples. The new method, called Rule Stretching, has been evaluated on several domains (using the inductive logic programming system Virtual Predic
作者: 扔掉掐死你    時間: 2025-3-28 17:33

作者: 證實    時間: 2025-3-28 20:53

作者: giggle    時間: 2025-3-28 23:34

作者: Presbycusis    時間: 2025-3-29 06:44
An Automated ILP Server in the Field of Bioinformatics,based method, . (HI), which acts as a filter for existing sequence similarity searches to improve their performance in the detection of remote protein homologies. HI performs a PSI-BLAST search to generate positive, negative, and uncertain examples, and collects descriptions of these examples. It th
作者: Obstreperous    時間: 2025-3-29 08:26

作者: 使困惑    時間: 2025-3-29 14:41
Towards Combining Inductive Logic Programming with Bayesian Networks, these languages. In this paper, we present results on combining . (ILP) with Bayesian networks to learn both the qualitative and the quantitative components of Bayesian logic programs. More precisely, we show how to combine the ILP setting . with score-based techniques for learning Bayesian network
作者: 表示問    時間: 2025-3-29 16:07
Demand-Driven Construction of Structural Features in ILP,ther unspecific way. That is, they do not construct features “on demand”, but rather in advance and without detecting the need for a representation change. Even if structural features are required, current methods do not construct these features in a goal-directed fashion..In previous work, we prese
作者: ONYM    時間: 2025-3-29 22:18

作者: BLINK    時間: 2025-3-30 01:16

作者: ADORE    時間: 2025-3-30 06:50

作者: Urgency    時間: 2025-3-30 09:34

作者: deface    時間: 2025-3-30 16:04

作者: Host142    時間: 2025-3-30 17:40

作者: ULCER    時間: 2025-3-30 22:09

作者: Instantaneous    時間: 2025-3-31 01:54
Efficient Cross-Validation in ILP,age of causing computational overhead. However, it has been shown that this overhead often consists of redundant computations, which can be avoided by performing all folds of the cross-validation in parallel. In this paper we study to what extent such a parallel algorithm is also useful in ILP. We d
作者: 呼吸    時間: 2025-3-31 09:03
of sequential and parallel time (i.e. Boolean circuit depth, equivalently: Turing machine space) complexity. While solutions to general smooth ODEs are known “PSPACE-complete” [Kawamura’10], we show that (i) The Cauchy problem for linear ODEs can be solved in NC., that is, within polylogarithmic par
作者: Collar    時間: 2025-3-31 09:38
Liviu Badeasuch dual linear-hierarchical structure include annotated linguistic data, executions of structured programs, and HTML/XML documents. Nested words generalize both words and ordered trees, and allow both word and tree operations. We define .-finite-state acceptors for nested words, and show that the
作者: Graduated    時間: 2025-3-31 16:42
Rodrigo Basilio,Gerson Zaverucha,Valmir C. Barbosative integer ., and the goal is to find a vertex subset . of size at most . such that . is an independent set. Further, we want that .[.] is highly connected. That is, .[.] should be . edge-connected. Clearly, the problem is .-complete, as substituting ., we obtain the . problem. A simple observatio
作者: 狂怒    時間: 2025-3-31 19:14
Agnès Braud,Christel Vraing problems into algorithmically solvable problems and algorithmically unsolvable ones. The second big bang of computer science was the development of the concept of computational complexity. People recognized that problems that do not admit efficient algorithms are not solvable in practice. The sear
作者: 殺菌劑    時間: 2025-3-31 23:15
Martin Eineborg,Henrik Bostr?melf, on complexity of generation algorithms. These algorithms can be partitioned into three groups: supergraph, flash-light (backtrack), and dual-bounded generation. We will call a problem . if it can be solved by a polynomial (.) or quasi-polynomial (.) time algorithm. More generally, for any posit
作者: 流利圓滑    時間: 2025-4-1 02:17
Susanne Hoche,Stefan Wrobelhe . problem we need to increase the edge-connectivity by?1. In the . problem . is connected and . should be 2-connected. In . problems every edge in . connects minimal deficient sets. For this version we give a simple combinatorial approximation algorithm with ratio 5/3, improving the 1.91 approxim
作者: Irrepressible    時間: 2025-4-1 06:08

作者: 杠桿    時間: 2025-4-1 10:29
Nico Jacobs,Hendrik Blockeelstraints is at least as hard as determining the winner in Mean Payoff Games, a notorious problem of open computational complexity. Mean Payoff Games are known to be in?., which is not known for max-closed semilinear constraints. Semilinear relations that are max-closed and additionally closed under
作者: brachial-plexus    時間: 2025-4-1 17:57

作者: 鋼筆尖    時間: 2025-4-1 21:47

作者: Unsaturated-Fat    時間: 2025-4-2 02:28

作者: AMEND    時間: 2025-4-2 05:21
Mark-A. Krogel,Stefan Wrobel of requirements and trade-offs between conflicting requirements. While there have been some general-purpose digital watermarking benchmarking systems available, they normally do not support complicated benchmarking tasks and cannot be easily reconfigured to work with different watermarking algorith




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
正阳县| 大丰市| 正镶白旗| 进贤县| 松江区| 台北县| 涞水县| 陕西省| 喜德县| 淮阳县| 抚顺县| 林西县| 阳春市| 安岳县| 富阳市| 巴楚县| 新巴尔虎左旗| 梁山县| 文安县| 灵山县| 西乌珠穆沁旗| 聂荣县| 蓬溪县| 朝阳市| 清远市| 安宁市| 北宁市| 缙云县| 嘉禾县| 北碚区| 通山县| 贡嘎县| 永川市| 吴江市| 长武县| 沁水县| 浮山县| 五原县| 依兰县| 鄂州市| 高安市|