Word Sense Disambiguation (WSD) is a challenging field of research in natural language processing. Enhanced WSD techniques have the potential to significantly enhance the performance of various Natural Language Proces...
详细信息
We present a series of experiments designed to quantify the algorithmic bias inherent in six off-the-shelf de-identification systems. We used false negative rate (FNR) and true positive rate (TPR) parity measures in a...
详细信息
this research investigates the impact of applying a Flipped Classroom Approach (FCA) in Vocational Education and proposes an improved approach that integrates Cognitive theory of Multimedia Learning (CTML) with flippe...
详细信息
We consider linear dynamical systems under floating-point rounding. In these systems, a matrix is repeatedly applied to a vector, but the numbers are rounded into floating-point representation after each step (i.e., s...
详细信息
ISBN:
(纸本)9783031308222;9783031308239
We consider linear dynamical systems under floating-point rounding. In these systems, a matrix is repeatedly applied to a vector, but the numbers are rounded into floating-point representation after each step (i.e., stored as a fixed-precision mantissa and an exponent). the approach more faithfully models realistic implementations of linear loops, compared to the exact arbitrary-precision setting often employed in the study of linear dynamical systems. Our results are twofold: We show that for non-negative matrices there is a special structure to the sequence of vectors generated by the system: the mantissas are periodic and the exponents grow linearly. We leverage this to show decidability of.-regular temporal model checking against semialgebraic predicates. this contrasts withthe unrounded setting, where even the non-negative case encompasses the long-standing open Skolem and Positivity problems. On the other hand, when negative numbers are allowed in the matrix, we showthat the reachability problem is undecidable by encoding a two-counter machine. Again, this is in contrast withthe unrounded setting where point-to-point reachability is known to be decidable in polynomial time.
We present INFER-SV, a wrapper that adapts INFER for SV-COMP. INFER is a static-analysis tool for C and other languages, developed by Facebook and used by multiple large companies. It is strongly aimed at industry and...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
We present INFER-SV, a wrapper that adapts INFER for SV-COMP. INFER is a static-analysis tool for C and other languages, developed by Facebook and used by multiple large companies. It is strongly aimed at industry and the internal use at Facebook. Despite its popularity, there are no reported numbers on its precision and efficiency. With INFER-SV, we take a first step towards an objective comparison of INFER with other SV-COMP participants from academia and industry.
We sketch a sequentialization-based technique for bounded detection of data races under sequential consistency, and summarise the major improvements to our verification framework over the last years.
ISBN:
(纸本)9783030995270;9783030995263
We sketch a sequentialization-based technique for bounded detection of data races under sequential consistency, and summarise the major improvements to our verification framework over the last years.
this article takes the interactive platforms of the Shenzhen Stock Exchange and the Shanghai Stock Exchange as a vertical domain-specific dialogue platform. Firstly, it proposes an automated method for quality rating ...
详细信息
To (dis)prove termination of C programs, AProVE uses symbolic execution to transform the program's LLVM code into an integer transition system, which is then analyzed by several backends. the transformation steps ...
详细信息
ISBN:
(纸本)9783030995270;9783030995263
To (dis)prove termination of C programs, AProVE uses symbolic execution to transform the program's LLVM code into an integer transition system, which is then analyzed by several backends. the transformation steps in AProVE and the tools in the backend only produce sub-proofs in their domains. Hence, we now developed new techniques to automatically combine the essence of these proofs. If non-termination is proved, then they yield an overall witness, which identifies a non-terminating path in the original C program.
In an era marked by rapid technological evolution, the advent of 5G networks heralds a transformative leap in telecommunications, promising to redefine our digital interactions with its unparalleled speed and connecti...
详细信息
ISBN:
(纸本)9798350350142
In an era marked by rapid technological evolution, the advent of 5G networks heralds a transformative leap in telecommunications, promising to redefine our digital interactions with its unparalleled speed and connectivity. this breakthrough, however, is accompanied by growing concerns over IT security, as highlighted in the comprehensive research conducted by Patrik Viktor and Monika Fodor from Obuda University. their study delves into the nuanced perceptions and attitudes toward IT security and 5G networks across different generational cohorts, employing a quantitative approach through a rigorously pre-tested standardized questionnaire. the investigation, which gathered insights from 443 evaluable questionnaires, uncovers notable generational disparities in the understanding of IT security threats and the emphasis on human factors within IT security frameworks. the research reveals that, despite the advanced technological landscape 5G networks introduce, there exists a prevalent sense of uncertainty regarding their security implications across all surveyed generational groups. this uncertainty underscores the complexity of integrating 5G technology into existing IT infrastructures and highlights the critical need for targeted educational initiatives and policy developments tailored to address these generational nuances in IT security awareness. Viktor and Fodor's findings underscore the pivotal role of networks in modern society, not merely as technological infrastructures but as fundamental components of human connectivity. the study emphasizes the importance of a multi-layered approach to cybersecurity, integrating technological solutions with an acute awareness of human behavior's role in maintaining secure digital environments. As we stand on the threshold of widespread 5G deployment, this research offers invaluable insights into the generational perspectives shaping our understanding of IT security in the age of 5G, advocating for a holistic strategy that comb
this thesis summarizes the construction of a digital financial management platform in the operational management process of aerospace enterprises, covering comprehensive budgeting, contract management, and full life-c...
详细信息
暂无评论