{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T05:09:17Z","timestamp":1736140157468,"version":"3.32.0"},"publisher-location":"Berlin\/Heidelberg","reference-count":33,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"354016782X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/bfb0022682","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T05:29:27Z","timestamp":1132723767000},"page":"133-169","source":"Crossref","is-referenced-by-count":2,"title":["Fundamental mechanisms in machine learning and inductive inference"],"prefix":"10.1007","author":[{"given":"Alan W.","family":"Biermann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"D. Angluin and C. Smith [1983], \u201cInductive inference: theory and methods\u201d, ACM Computing Surveys, Vol. 15.","DOI":"10.1145\/356914.356918"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"A. Biermann and J. Feldman [1972], \u201cOn the synthesis of finite-state machines from samples of their behavior\u201d, IEEE Trans. on Computers, Vol. C-21.","DOI":"10.1109\/TC.1972.5009015"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"A. Biermann [1972], \u201cOn the inference of Turing machines from sample computations\u201d, Artificial Intelligence, Vol. 3.","DOI":"10.1016\/0004-3702(72)90048-3"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"A. Biermann, R. Baum, and F. Petry [1975], \u201cSpeeding up the synthesis of programs from traces\u201d, IEEE Trans. on Computers, Vol. C-24.","DOI":"10.1109\/T-C.1975.224180"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"A. Biermann and R. Krishnaswamy [1976], \u201cConstructing programs from example computations\u201d, IEEE Trans. on Software Engineering, Vol. SE-2.","DOI":"10.1109\/TSE.1976.233812"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"A. Biermann [1978], \u201cThe inference of regular LISP programs from examples\u201d, IEEE Trans. on Systems, Man, and Cybernetics, Vol. SMC-8.","DOI":"10.1109\/TSMC.1978.4310035"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"A. Biermann and D. Smith [1979], \u201cA production rule mechanism for generating LISP code\u201d, IEEE Trans. on Systems, Man, and Cybernetics, Vol. SMC-9.","DOI":"10.1109\/TSMC.1979.4310195"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"A. Biermann, J. Fairfield, and T. Beres [1982], \u201cSignature table systems and learning\u201d, IEEE Transactions on Systems, Man and Cybernetics, Vol. SMC-12, No. 5.","DOI":"10.1109\/TSMC.1982.4308882"},{"key":"4_CR9","unstructured":"A. Biermann, G. Guiho, and Y. Kodratoff, (Eds.) [1984], Automatic Program Construction Techniquuues, Macmillan Publishing Co., N.Y."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"J. Feldman [1972], \u201cSome decidability results in grammatical inference\u201d, Information and Control, Vol. 20.","DOI":"10.1016\/S0019-9958(72)90424-X"},{"key":"4_CR11","unstructured":"N. Findler, Ed. [1979], Associative Networks, Academic Press, N.Y."},{"key":"4_CR12","unstructured":"P. Fink and A. Biermann [1986], \u201cThe correction of ill-formed input using history-based expectation with applications to speech understanding\u201d, to appear."},{"key":"4_CR13","unstructured":"K.S. Fu [1975], Syntactic Methods in Pattern Recognition, Academic Press, N.Y."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"M. Gold [1969], \u201cLanguage identification in the limit\u201d, Information and Control, Vol. 10.","DOI":"10.1016\/S0019-9958(67)91165-5"},{"key":"4_CR15","unstructured":"S. Hardy [1975], \u201cSynthesis of LISP programs from examples\u201d, Proc. Fourth International Joint Conf. on Artificial Intelligence."},{"key":"4_CR16","unstructured":"J.P. Jouannaud and Y. Kodratoff [1979], \u201cCharacterization of a class of functions synthesized from examples by a Summers-like method\u201d, Proc. Sixth International Joint Conference on Artificial Intelligence."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"S. Mamrak and P. Amer [1978], \u201cEstimation of run times using signature table analysis\u201d, NBS Special Publication 500-14, Fourteenth Computing Performance Evaluation User's Group, Boston, Mass., Oct., 1978.","DOI":"10.21236\/ADA060492"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"R.S. Michalski [1980], \u201cPattern recognition as rule-guided inductive inference\u201d, IEEE Trans. on Pattern Analysis and Machine Intelligence.","DOI":"10.1109\/TPAMI.1980.4767034"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"R.S. Michalski, J.G. Carbonell, T.M. Mitchell, [1983], Machine Learning, Tioga Publishing Company.","DOI":"10.1007\/978-3-662-12405-5"},{"volume-title":"Semantic Information Processing","year":"1968","key":"4_CR20","unstructured":"M. Minsky, Ed. [1968], Semantic Information Processing, M.I.T. Press, Cambridge, Mass."},{"key":"4_CR21","volume-title":"Perceptrons","author":"M. Minsky","year":"1969","unstructured":"M. Minsky and S. Papert [1969], Perceptrons, M.I.T. Press, Cambridge, Mass."},{"key":"4_CR22","unstructured":"N. Nilsson [1965], Learning Machines, McGraw Hill."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"C. Page [1977], \u201cHeuristics for signature table analysis as a pattern recognition technique\u201d, IEEE Trans. on Systems, Man, and Cybernetics, Vol. SMC-7.","DOI":"10.1109\/TSMC.1977.4309658"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"A. Samuel [1959], \u201cSome studies in machine learning using the game of checkers\u201d, IBM Journal of Research and Development.","DOI":"10.1147\/rd.33.0210"},{"key":"4_CR25","unstructured":"A. Samuel [1967], \u201cSome studies in machine learning using the game of checkers, II\u201d, IBM Journal of Research and Development."},{"key":"4_CR26","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1192.001.0001","volume-title":"Algorithmic Program Debugging","author":"E.Y. Shapiro","year":"1983","unstructured":"E.Y. Shapiro [1983], Algorithmic Program Debugging, M.I.T. Press, Cambridge, Mass."},{"key":"4_CR27","unstructured":"D. Smith [1984], \u201cThe synthesis of LISP programs from examples: a survey\u201d, in A. Biermann, G. Guiho, Y. Kodratoff (Eds.), Automatic Program Construction Techniques, Macmillan Publishing Co., 1984."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"M. Smith [1973], \u201cA learning program which plays partnership dominoes\u201d, Communications of the ACM, Vol. 16.","DOI":"10.1145\/355609.362314"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"P. Summers [1977], \u201cA methodology for LISP program construction from examples\u201d, Journal ACM, Vol. 24.","DOI":"10.1145\/321992.322002"},{"key":"4_CR30","unstructured":"T. Truscott [1979], \u201c'The Duke checker program\u201d, Journal of Recreational Mathematics, Vol. 12."},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"L. Valiant [1984], \u201cA theory of the learnable\u201d, Communications of the ACM, Vol. 27.","DOI":"10.1145\/1968.1972"},{"key":"4_CR32","unstructured":"D. Waterman, W. Faught, P. Klahr, S. Rosenschein, and R. Wesson [1984], \u201cDesign issues for exemplary programming\u201d, in A. Biermann, G. Guiho, Y. Kodratoff (Eds.), Automatic Program Construction Techniques, Macmillan Publishing Co., N.Y. 1984."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"R. Wharton [1977], \u201cGrammar enumeration and inference\u201d, Information and Control, Vol. 33.","DOI":"10.1016\/S0019-9958(77)80005-3"}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/BFb0022682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T21:23:20Z","timestamp":1736112200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0022682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["354016782X"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/bfb0022682","relation":{},"subject":[]}}