Academic literature on the topic 'Usage constraint inference'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Usage constraint inference.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Usage constraint inference"
Zhang, Chi, Bryant Chen, and Judea Pearl. "A Simultaneous Discover-Identify Approach to Causal Inference in Linear Models." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 06 (April 3, 2020): 10318–25. http://dx.doi.org/10.1609/aaai.v34i06.6595.
Full textTian, Lu, Rui Wang, Tianxi Cai, and Lee-Jen Wei. "The Highest Confidence Density Region and Its Usage for Joint Inferences about Constrained Parameters." Biometrics 67, no. 2 (September 3, 2010): 604–10. http://dx.doi.org/10.1111/j.1541-0420.2010.01486.x.
Full textPeluso, Valentino, Roberto Giorgio Rizzo, and Andrea Calimera. "Efficacy of Topology Scaling for Temperature and Latency Constrained Embedded ConvNets." Journal of Low Power Electronics and Applications 10, no. 1 (March 13, 2020): 10. http://dx.doi.org/10.3390/jlpea10010010.
Full textKang, James Jin, Kiran Fahd, and Sitalakshmi Venkatraman. "An Enhanced Inference Algorithm for Data Sampling Efficiency and Accuracy Using Periodic Beacons and Optimization." Big Data and Cognitive Computing 3, no. 1 (January 16, 2019): 7. http://dx.doi.org/10.3390/bdcc3010007.
Full textScioscia, Floriano, Michele Ruta, Giuseppe Loseto, Filippo Gramegna, Saverio Ieva, Agnese Pinto, and Eugenio Di Sciascio. "A Mobile Matchmaker for the Ubiquitous Semantic Web." International Journal on Semantic Web and Information Systems 10, no. 4 (October 2014): 77–100. http://dx.doi.org/10.4018/ijswis.2014100104.
Full textAntolín-Díaz, Juan, and Juan F. Rubio-Ramírez. "Narrative Sign Restrictions for SVARs." American Economic Review 108, no. 10 (October 1, 2018): 2802–29. http://dx.doi.org/10.1257/aer.20161852.
Full textLORENZ, DAVID. "Form does not follow function, but variation does: the origin and early usage of possessive havegot in English." English Language and Linguistics 20, no. 3 (October 25, 2016): 487–510. http://dx.doi.org/10.1017/s1360674316000332.
Full textBraun, Henry I., and Judith D. Singer. "Assessment for Monitoring of Education Systems: International Comparisons." ANNALS of the American Academy of Political and Social Science 683, no. 1 (May 2019): 75–92. http://dx.doi.org/10.1177/0002716219843804.
Full textIsmail, Ali, Taghlub Ryhan, and Zahrra Abdullah. "Usage of Alternative And Complementary Medicine Among Patients With Diabetes Mellitus at Diabetic Clinic in Kirkuk City / Iraq." Al-Kitab Journal for Pure Sciences 3, no. 2 (October 17, 2020): 239–46. http://dx.doi.org/10.32441/kjps.03.02.p22.
Full textMannweiler, C., C. Lottermann, A. Klein, J. Schneider, and H. D. Schotten. "Cyber-physical networking for wireless mesh infrastructures." Advances in Radio Science 10 (September 18, 2012): 113–18. http://dx.doi.org/10.5194/ars-10-113-2012.
Full textDissertations / Theses on the topic "Usage constraint inference"
Saied, Mohamed Aymen. "Inferring API Usage Patterns and Constraints : a Holistic Approach." Thèse, 2016. http://hdl.handle.net/1866/18471.
Full textSoftware systems increasingly depend on external library and frameworks. Software developers need to reuse functionalities provided by these libraries through their Application Programming Interfaces (APIs). Hence, software developers have to cope with the complexity of existing APIs needed to accomplish their work, and overcome the lack of usage directive in the API documentation. In this thesis, we propose a holistic approach that deals with the library usability problem at three levels of granularity. In the first step, we focus on the method level. We propose to identify usage constraints related to method parameters, by analyzing only the library source code. We applied program analysis strategies to detect four critical usage constraint types. At the second step, we change the scale to focus on API usage pattern mining in order to help developers to better learn common ways to use the API complementary methods. We first propose a client-based technique for mining multilevel API usage patterns to exhibit the co-usage relationships between API methods across interfering usage scenarios. Then, we proposed a library-based technique to overcome the strong constraint of client programs’ selection. Our technique infers API usage patterns through the analysis of structural and semantic relationships between API methods. Finally, we proposed a cooperative usage pattern mining technique that combines client-based and library-based usage pattern mining. Our technique takes advantage at the same time from the precision of the client-based technique and from the generalizability of the library-based technique. As a last contribution of this thesis, we target a higher level of library usability. We present a novel approach, to automatically identify third-party library usage patterns, of libraries that are commonly used together. This aims to help developers to discover reuse opportunities, and pick complementary libraries that may be relevant for their projects.
Book chapters on the topic "Usage constraint inference"
Kahn, David M., and Jan Hoffmann. "Exponential Automatic Amortized Resource Analysis." In Lecture Notes in Computer Science, 359–80. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45231-5_19.
Full textScioscia, Floriano, Michele Ruta, Giuseppe Loseto, Filippo Gramegna, Saverio Ieva, Agnese Pinto, and Eugenio Di Sciascio. "Mini-ME Matchmaker and Reasoner for the Semantic Web of Things." In Innovations, Developments, and Applications of Semantic Web and Information Systems, 262–94. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5042-6.ch010.
Full textScioscia, Floriano, Michele Ruta, Giuseppe Loseto, Filippo Gramegna, Saverio Ieva, Agnese Pinto, and Eugenio Di Sciascio. "A Mobile Matchmaker for the Ubiquitous Semantic Web." In Mobile Computing and Wireless Networks, 994–1017. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8751-6.ch042.
Full textBernhard, Stefan, Kristine Al Zoukra, and Christof Schtte. "From Non-Invasive Hemodynamic Measurements towards Patient-Specific Cardiovascular Diagnosis." In Data Mining, 2069–93. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2455-9.ch106.
Full textBernhard, Stefan, Kristine Al Zoukra, and Christof Schtte. "From Non-Invasive Hemodynamic Measurements towards Patient-Specific Cardiovascular Diagnosis." In Quality Assurance in Healthcare Service Delivery, Nursing and Personalized Medicine, 1–25. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-120-7.ch001.
Full textConference papers on the topic "Usage constraint inference"
Du, Changying, Xingyu Xie, Changde Du, and Hao Wang. "Redundancy-resistant Generative Hashing for Image Retrieval." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/696.
Full textTomkins, Sabina, Jay Pujara, and Lise Getoor. "Disambiguating Energy Disaggregation: A Collective Probabilistic Approach." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/398.
Full text