An estimation of the generalization performance of classifier is one of most important problems in pattern clasification and neural network training theory. In this paper we estimate the generalization error (mean exp...
详细信息
An estimation of the generalization performance of classifier is one of most important problems in pattern clasification and neural network training theory. In this paper we estimate the generalization error (mean expected probability of classification) for randomized linear zero empirical error (RLZEE) classifier which was considered by Raudys, Dičiūnas and Basalykas. inst.ad of "non-explicit" asymptotics of a generalization error of RLZEE classifier for centered multivariate spherically Gaussian classes proposed by Basalykas et al. (1996) we obtain an "explicit" and more simple asymptotics. We also present the numerical simulations illustrating our theoretical results and comparing them with each other and previously obtained results.
In this paper we present an algorithm that estimates dense planar-parallax motion from multiple uncalibrated views of a 3D scene. This generalizes the "plane + parallax" recovery methods to more than two fra...
详细信息
This article describes MOBICS (Mobile Computing Simulator), a distributed protocol simulator for mobile computing that facilitates the prototyping and testing of protocols based on high-level programming abstractions ...
详细信息
ISBN:
(纸本)1581133049
This article describes MOBICS (Mobile Computing Simulator), a distributed protocol simulator for mobile computing that facilitates the prototyping and testing of protocols based on high-level programming abstractions and simulation transparency. The main contribution of MOBICS is the implementation of a software architecture for simulators that supports interchangeable simulation modes without affecting the distributed protocols being prototyped. Through MOBICS we aim at providing a unified tool both for testing the correctness of a protocol and for evaluating its performance in a Simulated environment.
The paper briefly discusses past practices in developing knowledge-based information systems - so-called Knowledge Systems (KS) - in the electric power industry (EPI), pointing out some emerging success factors and co...
详细信息
ISBN:
(纸本)9608052114
The paper briefly discusses past practices in developing knowledge-based information systems - so-called Knowledge Systems (KS) - in the electric power industry (EPI), pointing out some emerging success factors and constraints in their deployment - e.g. lack of integration on the standardization front, and the need for Business Process Modeling (BPM) and in many cases for Business Process Re-engineering (BPR) - as a foundation for an architecture-driven strategy with strong "end-user integration", as opposed to past functionality-driven and stand-alone strategies. The effects of deregulation and competition on the EPI, combined with the emergence of the Internet/World-Wide- Web (WWW), E-Commerce, and the emergence of E-Utilities:- web-based power utility companies (PUC) which are mainly Power Marketers (PM)), and their roles in changing the traditional business processes in the EPI - including apparent deviations and/or convergence between developed and developing countries are briefly discussed. A cross-section of present modeling and development paradigms - e.g. object-orientation (OO) and agent-orientation (AO) -, relevant standards and standardization efforts are discussed, followed by an introduction of work on a simple web-enabled prototype Decision Support System (DSS) for Electric Power System (EPS) outage planning.
This paper explores the utilization of adaptive triangular meshes representing gray-level images to accelerate basic image processing operations. In particular, two algorithms for thresholding and labeling gray-level ...
详细信息
In this paper, we present an open and safe nested transaction model. We discuss the concurrency control and recovery algorithms for our model. Our nested transaction model uses the notion of a recovery point subtransa...
详细信息
In this paper, we present an open and safe nested transaction model. We discuss the concurrency control and recovery algorithms for our model. Our nested transaction model uses the notion of a recovery point subtransaction in the nested transaction tree. It incorporates a prewrite operation before each write operation to increase the potential concurrency. Our transaction model is termed `open and safe' as prewrites allow early reads (before writes are performed on disk) without cascading aborts. The systems restart and buffer management operations are also modeled as nested transactions to exploit possible concurrency during restart. The concurrency control algorithm proposed for database operations is also used to control concurrent recovery operations. We have given a snapshot of complete transaction processing, data structures involved and, building the restart state in case of crash recovery.
We report on a model checking case study of an industrial medium access protocol for wireless ATM. Since the protocol is too large to be verified by any of the existing checkers as a whole, the verification exploits t...
详细信息
We report on a model checking case study of an industrial medium access protocol for wireless ATM. Since the protocol is too large to be verified by any of the existing checkers as a whole, the verification exploits the layered and modular structure of the protocol's SDL specification and proceeds in a bottom-up, compositional way. The compositional arguments are used in combination with abstraction techniques to further reduce the state space of the system. The verification is primarily aimed at debugging the system. After correcting the specification step by step and validating various untimed and time-dependent properties, a model of the whole control component of the medium-access protocol is built and verified. The significance of the case study is in demonstrating that verification tools can handle complex properties of a model as large as shown.
In the paper we examine data dependencies in the algorithm of back substitution in the problem of solving triangular systems of linear equations. The aim of the paper is to illustrate the structural blanks (SB) notati...
详细信息
In the paper we examine data dependencies in the algorithm of back substitution in the problem of solving triangular systems of linear equations. The aim of the paper is to illustrate the structural blanks (SB) notation in consistency proof of data dependencies in loop programs. Data dependency semantics of programs is introduced and investigated. The introduced notation constitutes the theoretical basis of data dependencies in SB. Two structural modules - a sequential S-module and a parallel one - are examined.
The paper presents a new approach for shape recovery based on integrating geometric and photometric information. We consider 3D objects which are symmetric with respect to a plane (e.g., faces) and their reconstructio...
详细信息
暂无评论