標題: Titlebook: Logic-Based Program Synthesis and Transformation; 28th International S Fred Mesnard,Peter J. Stuckey Conference proceedings 2019 Springer N [打印本頁] 作者: VEER 時間: 2025-3-21 16:36
書目名稱Logic-Based Program Synthesis and Transformation影響因子(影響力)
書目名稱Logic-Based Program Synthesis and Transformation影響因子(影響力)學科排名
書目名稱Logic-Based Program Synthesis and Transformation網(wǎng)絡(luò)公開度
書目名稱Logic-Based Program Synthesis and Transformation網(wǎng)絡(luò)公開度學科排名
書目名稱Logic-Based Program Synthesis and Transformation被引頻次
書目名稱Logic-Based Program Synthesis and Transformation被引頻次學科排名
書目名稱Logic-Based Program Synthesis and Transformation年度引用
書目名稱Logic-Based Program Synthesis and Transformation年度引用學科排名
書目名稱Logic-Based Program Synthesis and Transformation讀者反饋
書目名稱Logic-Based Program Synthesis and Transformation讀者反饋學科排名
作者: kidney 時間: 2025-3-21 23:29
onverting the corpus into a numeric format and applying clustering techniques to this new format. Values are assigned to terms based on their frequency within a particular document, against their general occurrence in the corpus. One obstacle in achieving this aim is as a result of the polysemic nat作者: neurologist 時間: 2025-3-22 03:29
Salvador Lucasire session; not just at the beginning of the session. One example application domain, where this is a requirement, is in relation to Massive Open Online Courses (MOOCs) when users wish to obtain some kind of certification as evidence that they have successfully competed a course. Such continuous au作者: 藐視 時間: 2025-3-22 04:35
étienne Payetits their possibility of predicting the stock price changes and trading actions. Recently complex sentiment analysis techniques have also showed that large amount of social network posts can predict the price movements of the Dow Jones Industrial Average (DJIA) within a less stringent timescale. Fro作者: 編輯才信任 時間: 2025-3-22 11:11 作者: glamor 時間: 2025-3-22 15:49
attracted the attention of many researchers to overcome the disadvantage of signature-based IDSs in discovering complex attacks. Although there are some existing mechanisms for Intrusion detection, there is need to improve the performance. Machine Learning techniques are a new approach for Intrusion作者: florid 時間: 2025-3-22 18:02 作者: Gastric 時間: 2025-3-22 22:55
Petros Papapanagiotou,Jacques Fleuriotons, or exhibiting a dyadic nature with associated side-information. For example, one may be interested in predicting the preferences of a large set of customers for a variety of products, given various properties of both customers and products, as well as past purchase history, a social network on 作者: 斷斷續(xù)續(xù) 時間: 2025-3-23 02:35 作者: Occlusion 時間: 2025-3-23 08:20
ible to store the history as a whole. Therefore, when dealing with data streams, classification approaches in traditional data mining fall short and several enhancements are needed. In the literature, there are stream classifications methods such as stream based versions of nearest neighbor, decisio作者: Frequency 時間: 2025-3-23 09:45
Vincent Nys,Danny De Schreyeion of evacuation problems we call . (MAE) that consists of an undirected graph representing the map of the environment and a set of agents moving in this graph. The task is to move agents from the endangered part of the graph into the safe part as quickly as possible. Although the abstract evacuati作者: MEET 時間: 2025-3-23 14:13
Antonis Troumpoukis,Angelos Charalambidislacing the user at the center of all of them. Our current research is focused on two methods: Personas and Usability Testing. While one is used for communicating user requirements, the other one is used to evaluate a product’s ease of use by observing the users behavior. Although both methods are us作者: 商店街 時間: 2025-3-23 18:18
Moreno Falaschi,Carlos Olartelacing the user at the center of all of them. Our current research is focused on two methods: Personas and Usability Testing. While one is used for communicating user requirements, the other one is used to evaluate a product’s ease of use by observing the users behavior. Although both methods are us作者: 粘 時間: 2025-3-24 00:20 作者: 后天習得 時間: 2025-3-24 03:36 作者: 機制 時間: 2025-3-24 08:30 作者: Expertise 時間: 2025-3-24 12:25
w to acquire high quality training data has been discussed as one of its major problems. The existing language resources include emotion corpora; however, they are not available if the language is different. Constructing bilingual corpus manually is also financially difficult. We propose a method to作者: Basilar-Artery 時間: 2025-3-24 15:25
Proving Program Properties as First-Order Satisfiabilitythe . of such a theory, which is often incomputable. Recently, we have shown that properties . expressed as the existential closure of a boolean combination of atoms can be . by just finding a model of . and the . . of .. Furthermore, this idea works quite well in practice due to the existence of po作者: chiropractor 時間: 2025-3-24 20:52
Guided Unfoldings for Finding Loops in Standard Term Rewritingy it by . the unfolding process, using disagreement pairs in rewrite rules. This results in a partial computation of the unfoldings, whereas the original technique consists of a thorough computation followed by a mechanism for eliminating some rules. We have implemented this new approach in our tool作者: perimenopause 時間: 2025-3-24 23:40 作者: 暗諷 時間: 2025-3-25 07:03
Multiparty Classical Choreographiesyped multiparty sessions. Typing is achieved by generalising classical linear logic to judgements that explicitly record parallelism by means of hypersequents. Our approach unifies different lines of work on choreographies and processes with multiparty sessions, as well as their connection to linear作者: 殺人 時間: 2025-3-25 08:20 作者: 樣式 時間: 2025-3-25 15:07 作者: 他姓手中拿著 時間: 2025-3-25 16:04 作者: 免費 時間: 2025-3-25 23:13
Predicate Specialization for Definitional Higher-Order Logic Programss to be used where predicates typically occur. Higher-order characteristics are indeed desirable but on the other hand they are also usually more expensive to support. In this paper we propose a program specialization technique based on partial evaluation that can be applied to a modest but useful c作者: LEERY 時間: 2025-3-26 03:25 作者: 調(diào)味品 時間: 2025-3-26 05:29 作者: engagement 時間: 2025-3-26 10:30
Multivariant Assertion-Based Guidance in Abstract Interpretationut they also imply not always producing useful results. Automatic techniques have been studied to prevent precision loss, typically at the expense of larger resource consumption. In both cases (i.e., when analysis produces inaccurate results and when resource consumption is too high), it is necessar作者: 易于交談 時間: 2025-3-26 15:20
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/l/image/588103.jpg作者: 懲罰 時間: 2025-3-26 19:04
978-3-030-13837-0Springer Nature Switzerland AG 2019作者: DEI 時間: 2025-3-26 23:43
Logic-Based Program Synthesis and Transformation978-3-030-13838-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 翻布尋找 時間: 2025-3-27 03:16 作者: Jingoism 時間: 2025-3-27 06:16 作者: jet-lag 時間: 2025-3-27 10:55
source and does not keep pace with the changing nature of language. The aim of this paper is to show that while Wordnet can be affective, however it is static in nature and thus does not capture some contemporary usage of terms. Particularly when the dataset is taken from online conversation forums,作者: Albumin 時間: 2025-3-27 17:15
Salvador Lucasterms of a Multivariate-Keystroke Time Series which in turn can be transformed into the spectral domain. The time series can then be monitored dynamically for typing patterns that are indicative of a claimed user. Two transforms are considered, the Discrete Fourier Transform and the Discrete Wavelet作者: Mirage 時間: 2025-3-27 20:59 作者: backdrop 時間: 2025-3-28 01:15
María Alpuente,Angel Cuenca-Ortega,Santiago Escobar,José Meseguerwhile augmenting the pipeline depth; and (iii) measuring the performance in terms of generalization- / specialization- / misclassification-error and unknown-ratio. Experimental results show that, for the adopted dataset, PF is able to counteract great imbalances between negative and positive example作者: 拱墻 時間: 2025-3-28 05:26 作者: 接合 時間: 2025-3-28 07:18 作者: defibrillator 時間: 2025-3-28 11:29 作者: interpose 時間: 2025-3-28 16:44
Henning Christiansen,Maja H. Kirkebyear-optimal centralized algorithm using agent-based simulations in multiple real-life scenarios. Our finding it that LC-MAE produces solutions that are only worse than the optimum by a small factor. Moreover our approach led to important observations about how many agents need to behave rationally t作者: 反省 時間: 2025-3-28 20:36 作者: 瘙癢 時間: 2025-3-29 01:04
Vincent Nys,Danny De Schreyeear-optimal centralized algorithm using agent-based simulations in multiple real-life scenarios. Our finding it that LC-MAE produces solutions that are only worse than the optimum by a small factor. Moreover our approach led to important observations about how many agents need to behave rationally t作者: nettle 時間: 2025-3-29 06:52
Antonis Troumpoukis,Angelos Charalambidists of a set of HTML5 microdata schemas and an OWL specification, which include concepts and properties used to model personas and usability testing. In order to exemplify our model and extract desired data, we made use of semantically annotated templates for personas method and usability testing.作者: 憤怒歷史 時間: 2025-3-29 09:48
Moreno Falaschi,Carlos Olartets of a set of HTML5 microdata schemas and an OWL specification, which include concepts and properties used to model personas and usability testing. In order to exemplify our model and extract desired data, we made use of semantically annotated templates for personas method and usability testing.作者: 引水渠 時間: 2025-3-29 13:27
i) while the latter (IDS) aims to exploit a mutual synergy between different data domains or sources to guide the clustering in these different domains or sources. Our preliminary results in clustering data with mixed numerical and categorical attributes show that the proposed IDS framework gives be