We present a method to derandomize RNC algorithms, converting them to NC algorithms. Using it, we show how to approximate a class of iVP-hard integer programming problems in NC, to within factors better than the curre...
详细信息
In this paper we present the parallel debugger DETOP with special emphasis on new support for debugging of programs with distributed data structures such as arrays that have been partitioned over a number of processor...
详细信息
作者:
Kise, KShiraishi, TTakamatsu, SFukunaga, KCollege of Engineering
University of Osaka Prefecture Sakai Japan 593 Currently
with Mitsubishi Electric Corp. Shinobu Takamastu:graduated in 1971 from the Dept. Electrical Eng.
Coll. Eng. Univ. of Osaka Pref. where he received his Master's degree in 1973 and his Dr. of Eng. degree later. At present Assoc. Prof. Dept. Computer and Systems Sciences or C.S.S. Univ. of Osaka Pref. He is engaged in research on natural language understanding knowledge information processing and specification description language. He is a member Inf. Proc. Soc. and Soc. Artif. Intel. Member
Post-processing of character recognition refers to the processing used to correct the errors in character recognition. When the input is a string representing a sentence in the highly precise error correction, it is d...
详细信息
Post-processing of character recognition refers to the processing used to correct the errors in character recognition. When the input is a string representing a sentence in the highly precise error correction, it is desired that the syntactic as well as semantic examinations should be made at the sentence level. This paper assumes that the morphemes, syntax and semantics of the input sentence can be analyzed, and proposes a method that uses the syntactic and semantic analysis in the post-processing. The proposed method receives the list of candidate characters up to the fifth, and outputs the sentence that is adequate from the viewpoints of both syntax and semantics. The method features the following three points: (1) in word matching, it is examined also whether or not a sentence adequate from the viewpoints of syntax and semantics can he composed, and then the inadequate words extraction is inhibited;(2) characters having stronger syntactic and semantic constraints, such as the single-character particle and the conjugational suffix, are estimated top-down. Then, the case where the adequate character is not contained in the candidates can be handled;and (3) the words for which the adequateness cannot be determined from the syntactic or semantic viewpoint are selected by character re-recognition processing. An experiment is executed for 50 sample sentences. The character recognition rate is improved from 83.0 percent to 98.0 percent, and the sentence recognition rate is improved from 10.0 percent to 94.0 percent. Compared to the method based only on word matching, the sentence recognition rate is improved by more than 20 percent. In other words, the effectiveness of the proposed method is demonstrated.
Tackles some critical issues in diagnostic problem solving by addressing the conceptual design of automatic diagnostic systems able to cope with complex dynamic processes. The dynamic switching fuzzy system model intr...
详细信息
Tackles some critical issues in diagnostic problem solving by addressing the conceptual design of automatic diagnostic systems able to cope with complex dynamic processes. The dynamic switching fuzzy system model introduced by M.H. Smith (1994) is used as a generalized framework which dynamically changes the reasoning method by tuning the operators and/or defuzzification methods. This technique is applied to tune different fuzzy diagnostic models introduced by M. Ulieru (1995). The dynamic switching fuzzy diagnostic model (DFSDM) proposed in this paper can adapt online to drastic changes in the behavior of the diagnosed process. Tutorial investigations on an inverted pendulum clarify the ability of this method to cope with unexpected, unknown disturbances while simulation results on an electromechanical process prove the ability of this technique to manage critical faults in continuous dynamic systems.
Workflow management systems (WFMS) support the modeling, coordinated execution and monitoring of business processes within an organization. In particular, very large workflow management systems are used in organizatio...
详细信息
ISBN:
(纸本)354061057X
Workflow management systems (WFMS) support the modeling, coordinated execution and monitoring of business processes within an organization. In particular, very large workflow management systems are used in organizations with several thousand users, hundreds of thousands of process instances, and several thousand sites, all distributed over wide geographic areas. In these environments, failure of the WFMS or the underlying workflow database which stores the meta-information about the processes is not tolerable. This paper addresses the problem of providing high availability in workflow management systems by proposing a backup technique which ensures that execution of a process instance can be resumed at any point in time in the event of a failure. An essential characteristic of our backup scheme is that it allows the user to define different availability levels, reducing the cost of maintaining backups. The backup scheme is implemented using the workflow semantics, which we believe will (i) make it independent of the underlying workflow database, thus permitting the use of heterogeneous databases as primary and backup, (ii) reduce overheads, especially when compared to backup schemes provided by database systems.
In this paper, a design of a test processor ASIC employing a probabilistic approach is presented. The test processor chip is computer programmable. It consists of linear feedback shift register (LFSR) which can select...
详细信息
In this paper, a design of a test processor ASIC employing a probabilistic approach is presented. The test processor chip is computer programmable. It consists of linear feedback shift register (LFSR) which can select one of 16 polynomials and set user programmable need for every test set, signature analyzer and 3 built-in RAMs and other control circuitry. It is capable of generating random numbers and applying them to the circuit under test (CUT) and then retrieve the responses from the CUT. It can generate a signature by compressing the response data and detect circuit faults by comparing this signature with that of a good CUT. This ASIC can be used to design a low cost IC tester of reliable performance.
We present one possible design for a "wearable" computer-a computer that is worn. Our prototype permits text entry without the need of a table or other supporting surface. Typing can be performed while stand...
详细信息
Real-time programmers have to deal with the problem of relating timing constraints associated with source code to sequences of machine instructions. This paper describes an environment to assist users in the specifica...
详细信息
Real-time programmers have to deal with the problem of relating timing constraints associated with source code to sequences of machine instructions. This paper describes an environment to assist users in the specification and analysis of timing constraints. A user is allowed specify timing constraints within the source code of a C program. A user interface for a timing analyzer was developed to depict whether these constraints were violated or met. In addition, the interface allows portions of programs to be quickly selected with the corresponding bounded times, source code lines, and machine instructions automatically displayed The result is a user-friendly environment that supports the user specification and analysis of timing constraints at a high (source code) level and retains the accuracy of low (machine code) level analysis.
Today's firms are faced with new competitive and technological challenges. As a consequence, many senior executives are looking for information technology (IT) leaders who not only can understand technology but al...
详细信息
Today's firms are faced with new competitive and technological challenges. As a consequence, many senior executives are looking for information technology (IT) leaders who not only can understand technology but also can comprehend technology's potential to affect business strategy. For the IT leaders, rising to such numerous, and often conflicting, challenges is not easy. Indeed, there is a higher than average corporate dismissal rate and shorter tenure for IT leaders compared with other top executives. Based on the responses from 213 IT leaders in the financial services industry, this study found that the rank and role of a firm's IT leader must be aligned with the firm's competitive strategy. The implications of the findings for the firms' executives, as well as researchers, are discussed in detail.
暂无评论