Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Exclusive or

Known as: Exclusive disjunction, Or, Logical XOR 
Exclusive or or Exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false). It is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Gradient Boosting Decision Tree (GBDT) is a popular machine learning algorithm, and has quite a few effective implementations… Expand
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Much recent research has been devoted to learning algorithms for deep architectures such as Deep Belief Networks and stacks of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We analyze a model of imperfect price competition between intermediation service providers. We insist on features that are… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Combinatorial auctions, that is, auctions where bidders can bid on combinations of items, tend to lead to more efficient… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Militarized interstate disputes are united historical cases of conflict in which the threat, display or use of military force… Expand
  • table 3
  • table 4
  • figure 2
  • table 15
  • figure 8
Is this relevant?
Highly Cited
1994
Highly Cited
1994
The central objective of this paper is to show how vertical restraints, which affect intra-brand competition, can and will be… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
Highly Cited
1992
Highly Cited
1992
We investigate the use of information from all second order derivatives of the error function to perform network pruning (i.e… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1990
Highly Cited
1990
  • J. Elman
  • Cogn. Sci.
  • 1990
  • Corpus ID: 2763403
Time underlies many interesting human behaviors. Thus, the question of how to represent time in connectionist models is very… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?