Search
Now showing items 1031-1040 of 4210
Model-Based Robot Learning
(1988-04-01)
Models play an important role in learning from practice. Models of a controlled system can be used as learning operators to refine commands on the basis of performance errors. The examples used to demonstrate this ...
An Algorithm for Bootstrapping Communications
(2001-08-13)
I present an algorithm which allows two agents to generate a simple language based only on observations of a shared environment. Vocabulary and roles for the language are learned in linear time. Communication is robust and ...
A LISP Garbage Collector Algorithm Using Serial Secondary Storage
(1963-12-27)
This paper presents an algorithm for reclaiming unused free storage memory cells in LISP. It depends on availability of a fast secondary storage device, or a large block of available temporary storage. For this price, we ...
A Fast Parsing Scheme for Hand-Printed Mathematical Expressions
(1967-10-19)
A set of one-line text-book-style mathematical expressions is defined by a context free grammar. This grammar generates strings which describe the expressions in terms of mathematical symbols and some simple positional ...
Reducing Drift in Parametric Motion Tracking
(2001-05-07)
We develop a class of differential motion trackers that automatically stabilize when in finite domains. Most differ-ential trackers compute motion only relative to one previous frame, accumulating errors indefinitely. We ...
The Artificial Intelligence of Hubert L. Dreyfus: A Budget of Fallacies
(1968-01-01)
In December 1965 a paper by Hubert Dreyfus revived the old game of generating curious arguments for and against Artificial Intelligence. Dreyfus hit top form in September 1967 with an explanation in the Review of ...
Motion Estimation from Disparity Images
(2001-05-07)
A new method for 3D rigid motion estimation from stereo is proposed in this paper. The appealing feature of this method is that it directly uses the disparity images obtained from stereo matching. We assume that the stereo ...
Hash-Coding Functions of a Complex Variable
(1964-06-25)
A common operation in non-numerical analysis is the comparison of symbolic mathematical expressions. Often equivalence under the algebraic and trigonometric relations can be determined with the high probability by hash-coding ...
ITS 1.4 Reference Manual
(1968-06-01)
This reference manual is intended for those who have some knowledge of PDP-6 machine language and are either interested in the ITS monitor for its own sake, or who wish to write machine language programs to run under it. ...
HAKMEM
(1972-02-01)
Here is some little know data which may be of i nterest to computer hackers. The items and examples are so sketchy that to decipher them may require more sincerity and curiosity than a non-hacker can muster. Doubtless, ...