Due to the convenience of pervasive information environment, many people use various computing devices to perform plenty kinds of tasks. In the field of education, there are various applications to facilitate learner,...
详细信息
Due to the convenience of pervasive information environment, many people use various computing devices to perform plenty kinds of tasks. In the field of education, there are various applications to facilitate learner, especially for e-learning. However, some computing devices suffer from the limited resources and cannot accept rich information content. Therefore, the information content has to be tailored into different kinds of presentation depending on the types of computing devices. Context sensitivity is an application software system's ability to sense and analyze context from various sources. In this paper, we aim to customize static documents using context-sensitive middleware (CSM) to sense the computing device, and then using the agent-based parser to provide suitable content representation dynamically.
in the twenty-first century, seems many students are reluctant to participate in classroom matters day by day. Some days ago, a course teacher is providing a lecture, on the most important topics that will be implemen...
详细信息
This paper presents a method of realizing the current-mode counterparts of the classical Single Amplifier Biquad (SAB's) filters, especially those based on negative feedback. The resulting circuits have been simul...
详细信息
In this paper we give an overview of recent results on the rate maximization game in the Gaussian frequency-selective interference channel. We focus on the competitive maximization of information rates, subject to glo...
详细信息
ISBN:
(纸本)9780615153148
In this paper we give an overview of recent results on the rate maximization game in the Gaussian frequency-selective interference channel. We focus on the competitive maximization of information rates, subject to global power and spectral mask constraints. To achieve the so-called Nash equilibrium points of the game Yu, Ginis and Cioffl proposed the sequential Iterative Waterfilling Algorithm (IWFA), where, at each iteration, the users choose, one after the other, their power allocation to maximize their own information rate, treating the interference generated by the others as additive colored Gaussian noise. To overcome the potential slow convergence of the sequential update, specially when the number of users is large, the simultaneous IWFA was proposed by the authors, where, at each iteration, all the users update their power allocations simultaneously, rather than sequentially. Recently, the authors showed that both the sequential and the simultaneous IWFAs are just special cases of a more general unified framework, given by the totally asynchronous IWFA. In this more general algorithm, the users update their power spectral density in a completely distributed and asynchronous way. Furthermore, the asynchronous setup includes another form of lack of synchronism where the transmission by the different users contains time and frequency synchronization offsets. A unified set of convergence conditions were provided for the whole class of algorithms obtained from the asynchronous IWFA. Interestingly, there is a key result used in the proof of convergence of the algorithms: an alternative interpretation of the waterfilling operator as a projector.
This paper presents FraMark, a blockchain-based framework for 5G network management that utilizes Hyperledger Fabric and fractional Non-Fungible Tokens (NFTs) to optimize resource allocation. We introduce a comprehens...
详细信息
This paper considers the competitive maximization of information rates in the Gaussian frequency-selective interference channel, subject to global power and spectral mask constraints. We focus on the practical case in...
详细信息
Human-computer interactions require systems that work out of the box without requiring lots of data to adapt to a new task or user. In this research, we address low resource spoken language understanding tasks such as...
Human-computer interactions require systems that work out of the box without requiring lots of data to adapt to a new task or user. In this research, we address low resource spoken language understanding tasks such as named entity recognition (NER), intent recognition (IR), and slot filling (SF) to research how a pretrained model can be modified for a new task, then finetuned with few labelled data. We propose extending the Whisper model with task-specific modules for NER, SF, and IR, leveraging a Markov network as output structure. We develop a novel approach to finetuning by removing irrelevant weights and reorganizing the embeddings to drastically improve the performance in a low-resource setting. Our approach outperforms previous models without external language models and demonstrates effective transfer learning, even with very limited training data. The models exhibit a small footprint, making them suitable for applications requiring robustness, few-shot learning, and efficiency.
In the majority of analytical and imitation models analyzing the processes of communication networks functioning, input streams are associated with the well known Poisson's model, describing the most unfavorable c...
详细信息
In the majority of analytical and imitation models analyzing the processes of communication networks functioning, input streams are associated with the well known Poisson's model, describing the most unfavorable case of stationary random streams. In practice the input streams are characterized mainly with strong nonstationary processes, impacting the final results of modeling to a significant degree. Having this in mind this report presents an input stream model for simulation modeling and analysis of communication networks.
Patient specific forecasting tools are an area of active research and very much seen as a necessary tool for future improvements in healthcare. In order to succeed with decision making tools, fine-grained data are req...
详细信息
The increasing complexity of smart phones makes them more susceptible to accidental failures. However, there is still little understanding on the dependability behavior of modern smart phones. In this paper, we propos...
详细信息
暂无评论