9,512 research outputs found

    Franco-Japanese Research Collaboration on Constraint Programming

    Get PDF
    International audienceConstraint programming is an emergent technology that allows modeling and solving various problems in many areas such as artificial intelligence, computer programming, computer-aided design, computer graphics, and user interfaces. In this report, we provide recent activities of research collaboration on constraint programming conducted by the authors and other researchers in France and Japan. First, we outline our joint research projects on constraint programming, and then present the backgrounds, goals, and approaches of several research topics treated in the projects. Second, we describe the two Franco-Japanese Workshops on Constraint Programming (FJCP), which we organized in Japan in October 2004 and in France in November 2005. We conclude with future prospects for collaboration between French and Japanese researchers in this area

    A dynamic default revision mechanism for speculative computation

    Get PDF
    In this work a default revision mechanism is introduced into Speculative Computation to manage incomplete information. The default revision is supported by a method for the generation of default constraints based on Bayesian Networks. The method enables the generation of an initial set of defaults which is used to produce the most likely scenarios during the computation, represented by active processes. As facts arrive, the Bayesian Network is used to derive new defaults. The objective with such a new dynamic mechanism is to keep the active processes coherent with arrived facts. This is achieved by changing the initial set of default constraints during the reasoning process in Speculative Computation. A practical example in clinical decision support is described.info:eu-repo/semantics/publishedVersio

    The Organizational Design of Intelligence Failures

    Get PDF
    While the detection, and prevention, of the September 11, 2001 plot would have been ideal, I argue that the more major intelligence failures occurred after the attacks of September 11. The erroneous intelligence concerning the WMD presence in Iraq permitted the Bush Administration to order the invasion of Iraq. Systematic underestimates of the budgetary costs and personnel requirements of the war meant that Congress did not give the matter the debate that it warranted. Finally, incorrect (or incomplete) intelligence concerning the extent of the informal opposition to the U.S. led forces resulted in inadequate numbers of allied forces being deployed and a protracted period of conflict and disruption in Iraq. These facts are all well known to anyone who reads newspapers. I make three arguments in this paper. First, the collection of the intelligence data and its evaluation does not occur in a vacuum. There must always be an organizing theory that motivates the collection and evaluation of the data and that this theory is formulated at the highest levels of the decision making process. Second, it is not possible to construct a truly neutral or objective (analytical) hierarchy. Third, it is impossible to separate the analytical evaluation of the data from the decision that will be based on such evaluation. As an inevitable consequence of these arguments, intelligence analysis and the resulting conclusions are driven by top-down considerations rather than bottom-up as has been argued by some reviewers of recent intelligence failures. Key Words: stable coalitions, self-enforcing agreements, compliance, enforcement, public goods

    Backwards is the way forward: feedback in the cortical hierarchy predicts the expected future

    Get PDF
    Clark offers a powerful description of the brain as a prediction machine, which offers progress on two distinct levels. First, on an abstract conceptual level, it provides a unifying framework for perception, action, and cognition (including subdivisions such as attention, expectation, and imagination). Second, hierarchical prediction offers progress on a concrete descriptive level for testing and constraining conceptual elements and mechanisms of predictive coding models (estimation of predictions, prediction errors, and internal models)

    United States Attorneys — Whom Shall They Serve?

    Get PDF
    Perry examines the fidelity of US Attorneys in a new light and provides a way to consider them more broadly

    Crown Financial Asset Management: Objectives and Practice

    Get PDF
    This paper analyses key issues that may be relevant to setting the Crown's overall objectives and practices for financial asset and liability management. It examines implications of the nature of the Crown's balance sheet for asset and liability management and investigates the appropriate approach of the Crown towards managing risk (concluding that a risk averse approach is warranted). The issue of centralisation versus decentralisation of Crown asset and liability management is analysed both from a portfolio management perspective and from an organisational design perspective. Insights from private sector financial conglomerates are also incorporated. The paper concludes that individual Crown financial entities should each continue to be responsible for setting their own strategic asset allocation, after taking into account the nature of their liabilities. A central Crown body should, however, monitor and aggregate information from each of these entities and be delegated the responsibility and power to manage risks to the overall Crown balance sheet.Crown balance sheet; Public debt management

    The virtues and vices of equilibrium and the future of financial economics

    Get PDF
    The use of equilibrium models in economics springs from the desire for parsimonious models of economic phenomena that take human reasoning into account. This approach has been the cornerstone of modern economic theory. We explain why this is so, extolling the virtues of equilibrium theory; then we present a critique and describe why this approach is inherently limited, and why economics needs to move in new directions if it is to continue to make progress. We stress that this shouldn't be a question of dogma, but should be resolved empirically. There are situations where equilibrium models provide useful predictions and there are situations where they can never provide useful predictions. There are also many situations where the jury is still out, i.e., where so far they fail to provide a good description of the world, but where proper extensions might change this. Our goal is to convince the skeptics that equilibrium models can be useful, but also to make traditional economists more aware of the limitations of equilibrium models. We sketch some alternative approaches and discuss why they should play an important role in future research in economics.Comment: 68 pages, one figur

    Real Islamic Logic

    Get PDF
    Four options for assigning a meaning to Islamic Logic are surveyed including a new proposal for an option named "Real Islamic Logic" (RIL). That approach to Islamic Logic should serve modern Islamic objectives in a way comparable to the functionality of Islamic Finance. The prospective role of RIL is analyzed from several perspectives: (i) parallel distributed systems design, (ii) reception by a community structured audience, (iii) informal logic and applied non-classical logics, and (iv) (in)tractability and artificial intelligence

    CODEWEAVE: exploring fine-grained mobility of code

    Get PDF
    This paper is concerned with an abstract exploration of code mobility constructs designed for use in settings where the level of granularity associated with the mobile units exhibits significant variability. Units of mobility that are both finer and coarser grained than the unit of execution are examined. To accomplish this, we take the extreme view that every line of code and every variable declaration are potentially mobile, i.e., it may be duplicated or moved from one program context to another on the same host or across the network. We also assume that complex code assemblies may move with equal ease. The result is CODEWEAVE, a model that shows how to develop new forms of code mobility, assign them precise meaning, and facilitate formal verification of programs employing them. The design of CODEWEAVE relies greatly on Mobile UNITY, a notation and proof logic for mobile computing. Mobile UNITY offers a computational milieu for examining a wide range of constructs and semantic alternatives in a clean abstract setting, i.e., unconstrained by compilation and performance considerations traditionally associated with programming language design. Ultimately, the notation offered by CODEWEAVE is given exact semantic definition by means of a direct mapping to the underlying Mobile UNITY model. The abstract and formal treatment of code mobility offered by CODEWEAVE establishes a technical foundation for examining competing proposals and for subsequent integration of some of the mobility constructs both at the language level and within middleware for mobility
    • 

    corecore