Results 51 to 60 of about 93,680 (316)
Shrinking the Inductive Programming Search Space with Instruction Subsets [PDF]
Inductive programming frequently relies on some form of search in order to identify candidate solutions. However, the size of the search space limits the use of inductive programming to the production of relatively small programs. If we could somehow correctly predict the subset of instructions required for a given problem then inductive programming ...
arxiv
Inductive Logic Programming: Theory and methods [PDF]
AbstractInductive Logic Programming (ILP) is a new discipline which investigates the inductive construction of first-order clausal theories from examples and background knowledge. We survey the most important theories and methods of this new field. First, various problem specifications of ILP are formalized in semantic settings for ILP, yielding a ...
Muggleton, Stephen, De Raedt, Luc
openaire +2 more sources
Al–Si alloys are particularly in demand for automotive and electronic applications, thanks to their excellent wear and thermal properties. Nevertheless, when processed by conventional methods with low cooling rates, the coarse primary Si phases are responsible for increasing brittleness and inducing crack propagation.
Layla Shams Tisha+3 more
wiley +1 more source
Inductive programming meets the real world [PDF]
Inductive programming can liberate users from performing tedious and repetitive tasks.
Gulwani, Sumit+5 more
openaire +5 more sources
KupferDigital: Ontology‐Based Digital Representation for the Copper Life Cycle
It is demonstrated how data from different stages in the life cycle of a copper product can be stored in an ontology‐based data space. In order to showcase the methods and tools used in the project, four use cases are presented that show how data from different sources can be semantically described and queried from a shared data space.
Miriam Eisenbart+18 more
wiley +1 more source
XAI Human-Machine collaboration applied to network security
Cyber attacking is easier than cyber defending—attackers only need to find one breach, while the defenders must successfully repel all attacks. This research demonstrates how cyber defenders can increase their capabilities by joining forces with ...
Steve Moyle+2 more
doaj +1 more source
Induction of constraint logic programs [PDF]
Inductive Logic Programming (ILP) is concerned with learning hypotheses from examples, where both examples and hypotheses are represented in the Logic Programming (LP) language. The application of ILP to problems involving numerical information has shown the need for basic numerical background knowledge (e.g. relation “less than”).
Sebag, Michèle+2 more
openaire +3 more sources
This study demonstrates the feasibility of fabricating free‐standing carbon paper electrodes by electroplating and galvanic replacement. Nanostructured AgM (M = Au, Pt, Pd) bimetallic catalysts are directly grown on the electrode substrate, which exhibit good performance for glycerol electrolysis, a sustainable approach for the co‐production of green ...
Hui Luo, Maria‐Magdalena Titirici
wiley +1 more source
Learning logic programs through divide, constrain, and conquer [PDF]
We introduce an inductive logic programming approach that combines classical divide-and-conquer search with modern constraint-driven search. Our anytime approach can learn optimal, recursive, and large programs and supports predicate invention. Our experiments on three domains (classification, inductive general game playing, and program synthesis) show
arxiv
Are There Good Mistakes? A Theoretical Analysis of CEGIS [PDF]
Counterexample-guided inductive synthesis CEGIS is used to synthesize programs from a candidate space of programs. The technique is guaranteed to terminate and synthesize the correct program if the space of candidate programs is finite. But the technique may or may not terminate with the correct program if the candidate space of programs is infinite ...
arxiv +1 more source