Browsing by Title

Now showing items 3298-3317 of 4790

  • A Primer for the Act-1 Language 

    Unknown author (MIT Artificial Intelligence Laboratory, 1981-06)
    This document is intended to describe the current design for computer programming language, Act-1. It describes the Actor computational model, which Act-1 was designed to support. A perspective is provided from which to ...

  • A Primitive Control P Feature 

    Unknown author (1966-10-01)
    A program, some TECO macros, and some small modifications to existing systems software have been written, called PRO, whose purpose is to reduce the large number of control languages and system programs it has been necessary ...

  • A Primitive Recognizer of Figures in a Scene 

    Unknown author (1967-01-01)
    Given a scene, as seen for instance from a T.V. camera or a picture, it is desired to analyze it to organize, differentiate and identify desired objects or classes of objects (i.e., patterns) in it. The present report ...

  • Primitive Recursion 

    Unknown author (1963-07-01)
    This is one of a series of memos concerning a logical system for proof-checking. It is not self-contained, but belongs with future memos which will describe a complete formal system with its intended interpretation and ...

  • Principle-Based Parsing 

    Unknown author (1987-06-01)
    During the past few years, there has been much discussion of a shift from rule-based systems to principle-based systems for natural language processing. This paper outlines the major computational advantages of ...

  • Principle-Based Parsing for Machine Translation 

    Unknown author (1987-12-01)
    Many syntactic parsing strategies for machine translation systems are based entirely on context-free grammars. These parsers require an overwhelming number of rules; thus, translation systems using rule-based parsers ...

  • Principles for Engineered Emergence (slides) 

    Unknown author (2007-04-12)
    Principles for Engineered EmergenceIt is difficult to establish engineering control over the behavior ofaggregates of unreliable devices with complicated interactionpatterns. I take a linguistic view of this problem, ...

  • Principles of Knowledge Representation and Reasoning in the FRAPPE System 

    Unknown author (MIT Artificial Intelligence Laboratory, 1989-05)
    The purpose of this paper is to elucidate the following four important architectural principles of knowledge representation and reasoning with the example of an implemented system: limited reasoning, truth maintenance, ...

  • Principles of PSI-PMI Curricular 

    Goodman, Bob (2017-07-13)
    NA

  • Principles, Opportunism and Seeing in Design: A Computational Approach 

    Unknown author (1991-06-01)
    This thesis introduces elements of a theory of design activity and a computational framework for developing design systems. The theory stresses the opportunistic nature of designing and the complementary roles of focus ...

  • Priors Stabilizers and Basis Functions: From Regularization to Radial, Tensor and Additive Splines 

    Unknown author (1993-06-01)
    We had previously shown that regularization principles lead to approximation schemes, as Radial Basis Functions, which are equivalent to networks with one layer of hidden units, called Regularization Networks. In this ...

  • Prism Trees: An Efficient Representation for Manipulating and Displaying Polyhedra with Many Faces 

    Unknown author (1985-04-01)
    Computing surface and/or object intersections is a cornerstone of many algorithms in Geometric Modeling and Computer Graphics, for example Set Operations between solids, or surface Ray Casting display. We present an ...

  • PRISM: A Practical Real-Time Imaging Stereo Matcher 

    Unknown author (1984-05-01)
    A binocular-stereo-matching algorithm for making rapid visual range measurements in noisy images is described. This technique is developed for application to problems in robotics where noise tolerance, reliability, and ...

  • Privacy and Security Risks for National Health Records Systems 

    Unknown author (2018-01-24)
    A review of national health records (NEHR) systems shows that privacy and security risks have a profound impact on the success of such projects. Countries have different approaches when dealing with privacy and security ...

  • Privacy engineering for social networks 

    Anderson, Jonathan (University of CambridgeFaculty of Computer Science and TechnologyComputer Laboratory, 2013-01-08)
    In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them. Footlights is a platform for distributed social applications that ...

  • Pro-p subgroups of profinite completions of 3-manifold groups 

    Wilton, Henry John; Zalesskii, P
    We completely describe the finitely generated pro-$p$ subgroups of the profinite completion of the fundamental group of an arbitrary 3-manifold. We also prove a pro-$p$ analogue of the main theorem of Bass–Serre theory for ...

  • Probabilistic Analysis of Multistage Interconnection Network Performance 

    Unknown author (1992-04-01)
    We present methods of calculating the value of two performance parameters for multipath, multistage interconnection networks: the normalized throughput and the probability of successful message transmission. We develop ...

  • Probabilistic and Statistical Analysis of Perforated Patterns 

    Unknown author (2011-01-19)
    We present a new foundation for the analysis and transformation of computer programs.Standard approaches involve the use of logical reasoning to prove that the applied transformation does not change the observable semantics ...

  • Probabilistic Independence Networks for Hidden Markov Probability Models 

    Unknown author (1996-03-13)
    Graphical techniques for modeling the dependencies of randomvariables have been explored in a variety of different areas includingstatistics, statistical physics, artificial intelligence, speech recognition, image ...

  • Probabilistic Solution of Ill-Posed Problems in Computational Vision 

    Unknown author (1987-03-01)
    We formulate several problems in early vision as inverse problems. Among the solution methods we review standard regularization theory, discuss its limitations, and present new stochastic (in particular, Bayesian) ...