31,641 research outputs found
Inducing a Semantically Annotated Lexicon via EM-Based Clustering
We present a technique for automatic induction of slot annotations for
subcategorization frames, based on induction of hidden classes in the EM
framework of statistical estimation. The models are empirically evalutated by a
general decision test. Induction of slot labeling for subcategorization frames
is accomplished by a further application of EM, and applied experimentally on
frame observations derived from parsing large corpora. We outline an
interpretation of the learned representations as theoretical-linguistic
decompositional lexical entries.Comment: 8 pages, uses colacl.sty. Proceedings of the 37th Annual Meeting of
the ACL, 199
Relating two standard notions of secrecy
Two styles of definitions are usually considered to express that a security
protocol preserves the confidentiality of a data s. Reachability-based secrecy
means that s should never be disclosed while equivalence-based secrecy states
that two executions of a protocol with distinct instances for s should be
indistinguishable to an attacker. Although the second formulation ensures a
higher level of security and is closer to cryptographic notions of secrecy,
decidability results and automatic tools have mainly focused on the first
definition so far.
This paper initiates a systematic investigation of the situations where
syntactic secrecy entails strong secrecy. We show that in the passive case,
reachability-based secrecy actually implies equivalence-based secrecy for
digital signatures, symmetric and asymmetric encryption provided that the
primitives are probabilistic. For active adversaries, we provide sufficient
(and rather tight) conditions on the protocol for this implication to hold.Comment: 29 pages, published in LMC
PrIC3: Property Directed Reachability for MDPs
IC3 has been a leap forward in symbolic model checking. This paper proposes
PrIC3 (pronounced pricy-three), a conservative extension of IC3 to symbolic
model checking of MDPs. Our main focus is to develop the theory underlying
PrIC3. Alongside, we present a first implementation of PrIC3 including the key
ingredients from IC3 such as generalization, repushing, and propagation
Bayesian Grammar Induction for Language Modeling
We describe a corpus-based induction algorithm for probabilistic context-free
grammars. The algorithm employs a greedy heuristic search within a Bayesian
framework, and a post-pass using the Inside-Outside algorithm. We compare the
performance of our algorithm to n-gram models and the Inside-Outside algorithm
in three language modeling tasks. In two of the tasks, the training data is
generated by a probabilistic context-free grammar and in both tasks our
algorithm outperforms the other techniques. The third task involves
naturally-occurring data, and in this task our algorithm does not perform as
well as n-gram models but vastly outperforms the Inside-Outside algorithm.Comment: 8 pages, LaTeX, uses aclap.st
A forward--backward stochastic algorithm for quasi-linear PDEs
We propose a time-space discretization scheme for quasi-linear parabolic
PDEs. The algorithm relies on the theory of fully coupled forward--backward
SDEs, which provides an efficient probabilistic representation of this type of
equation. The derivated algorithm holds for strong solutions defined on any
interval of arbitrary length. As a bypass product, we obtain a discretization
procedure for the underlying FBSDE. In particular, our work provides an
alternative to the method described in [Douglas, Ma and Protter (1996) Ann.
Appl. Probab. 6 940--968] and weakens the regularity assumptions required in
this reference.Comment: Published at http://dx.doi.org/10.1214/105051605000000674 in the
Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute
of Mathematical Statistics (http://www.imstat.org
On the use of JMAK theory to describe mechanical amorphization: a comparison between experiments, numerical solutions and simulations
The kinetics of amorphization during ball milling is generally analyzed using two different
approaches: the classical Johnson-Mehl-Avrami-Kolmogorov (JMAK) theory and Delogu and Cocco’s
model for which a region deterministically transforms after it reaches a certain number of collisions.
The application of JMAK analysis to the latter model predicts Avrami exponents to be higher than
the experimental ones (typically close to one). We develop simulations based on the probabilistic
character of the nucleation phenomenon and concave growth of the amorphous phase in the core
of a nanocrystal. The predictions of our simulations are in good agreement with the low Avrami
exponents and with the size evolution of the remaining crystallites found experimentally. From these
values, the parameters involved in the simulated model (growth rate and probability of nucleation)
can be estimated.AEI/FEDER-UE (Project MAT-2016-77265-R)Junta de Andalucía (Grupo PAI
PSPACE Bounds for Rank-1 Modal Logics
For lack of general algorithmic methods that apply to wide classes of logics,
establishing a complexity bound for a given modal logic is often a laborious
task. The present work is a step towards a general theory of the complexity of
modal logics. Our main result is that all rank-1 logics enjoy a shallow model
property and thus are, under mild assumptions on the format of their
axiomatisation, in PSPACE. This leads to a unified derivation of tight
PSPACE-bounds for a number of logics including K, KD, coalition logic, graded
modal logic, majority logic, and probabilistic modal logic. Our generic
algorithm moreover finds tableau proofs that witness pleasant proof-theoretic
properties including a weak subformula property. This generality is made
possible by a coalgebraic semantics, which conveniently abstracts from the
details of a given model class and thus allows covering a broad range of logics
in a uniform way
- …