Results 121 to 130 of about 2,960,567 (255)
Kripke on Gödel Incompleteness
ABSTRACT This paper surveys six of Saul Kripke's highly creative ideas and results on Gödel incompleteness, from when he was an undergraduate to last publications. These include his extension of incompleteness from sentences to predicates, his model‐theoretic proof of incompleteness of arithmetic, his compelling analysis of incompleteness in terms of ...
Daniel Isaacson
wiley +1 more source
A Review on Neural Turing Machine (NTM)
Soroor Malekmohamadi Faradonbe +2 more
semanticscholar +1 more source
A function f is said to be idempotent if f(f(x)) = f(x) holds whenever f(x) is defined. This paper presents a computation model for idempotent functions, called an idempotent Turing machine. The computation model is necessarily and sufficiently expressive in the sense that not only does it always compute an idempotent function but also every idempotent
openaire +3 more sources
A universal Turing machine [PDF]
The aim of this paper is to give an example of a universal Turing machine, which is somewhat small. To get a small universal Turing machine a common constructions would go through simulating tag system (see Minsky 1967). The universal machine here simulate two-symbol Turing machines directly.
openaire +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
In the ever-evolving landscape of Information Technologies, private decentralized computing on an honest yet curious server has emerged as a prominent paradigm. While numerous schemes exist to safeguard data during computation, the focus has primarily been on protecting the confidentiality of the data itself, often overlooking the potential information
Sofiane Azogagh +2 more
openaire +3 more sources
Detection of protein symmetry and structural rearrangements using secondary structure elements
Abstract Many proteins exhibit a degree of internal symmetry in their tertiary structure, including circular permutations. These characteristics play an important role in terms of the functional robustness of proteins against mutations, and are pivotal for the study of protein function and evolution.
Runfeng Lin, Sebastian E. Ahnert
wiley +1 more source
Statistical Complexity Analysis of Turing Machine tapes with Fixed Algorithmic Complexity Using the Best-Order Markov Model. [PDF]
Silva JM, Pinho E, Matos S, Pratas D.
europepmc +1 more source
Efficient Deconvolution in Populational Inverse Problems
ABSTRACT This work is focused on the inversion task of inferring the distribution over parameters of interest, leading to multiple sets of observations. The potential to solve such distributional inversion problems is driven by the increasing availability of data, but a major roadblock is blind deconvolution, arising when the observational noise ...
Arnaud Vadeboncoeur +2 more
wiley +1 more source

