In this paper, we first propose a specification ap-proach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching ...
详细信息
In this paper, we first propose a specification ap-proach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching time logic for ZIAs is presented. We then give an algorithm for model checking this logic on ZIAs with finite domain. Furthermore, we present a mu-calculus logic for ZIAs, and give a model checking algorithm for this logic.
A novel 3D shape matching method is proposed in this paper. We first extract angular and distance feature pairs from pre-processed 3D models, then estimate their kernel densities after quantifying the feature pairs in...
详细信息
ISBN:
(纸本)9781424475421
A novel 3D shape matching method is proposed in this paper. We first extract angular and distance feature pairs from pre-processed 3D models, then estimate their kernel densities after quantifying the feature pairs into a fixed number of bins. During 3D matching, we adopt the KL-divergence as a distance of 3D comparison. Experimental results show that our method is effective to match similar 3D shapes, and robust to model deformations or rotation transformations.
This paper presents a discriminative model for part of speech tagging of traditional *** use Maximum Entropy Model with Morphological features of Mongolian. First, the context feature templates are defined and extract...
详细信息
This paper presents a discriminative model for part of speech tagging of traditional *** use Maximum Entropy Model with Morphological features of Mongolian. First, the context feature templates are defined and extracted from the training corpus. Then, the parameters of maximum entropy probability models are calculated. Experimental results show that integration of morphological features of Maximum Entropy Model for Mongolian part of speech tagging outperform HMM since they are flexible enough to capture many correlated non-independent features.
The DC current rejection of a single phase half-bridge grid-connected inverter with a line-frequency isolation transformer is researched in this paper. The impact of the magnetic dc bias of the transformer is given ou...
详细信息
ISBN:
(纸本)9781424471591
The DC current rejection of a single phase half-bridge grid-connected inverter with a line-frequency isolation transformer is researched in this paper. The impact of the magnetic dc bias of the transformer is given out from the mathematic model of the transformer in current-mode control. For the half-bridge current-mode inverter, the dc current rejection method is presented based on the relationship of dc current component and voltages across the filter capacitors of the dc bus. Simulation and experiment results indicate that the dc component of inverter current saturates the transformer and degrades the quality of current injected into the grid. With voltage balance control of the filter capacitors, the dc current control of half-bridge current-mode grid connected inverter is realized.
For tree XML, constraints that specify structural relationships among nodes or paths are very natural. In this paper, we introduce the concept of structural integrity constraints for XML (XSICs), which specify path im...
详细信息
For tree XML, constraints that specify structural relationships among nodes or paths are very natural. In this paper, we introduce the concept of structural integrity constraints for XML (XSICs), which specify path implication, path cooccurrence, path mutual-exclusion, element obligatory inclusion and exclusive inclusion, and define the syntax and semantics of XSICs. For reasoning about XSICs, we rewrite all the other constraints into path implication constraints, and develop a sound and complete set of inference rules for path implication constraints. Meanwhile, we propose the concept of path implication closure. By using the path implication closure, we prove the completeness of inference rules, and determine the implication decision about XSICs.
Word sense disambiguation is a crucial and difficult problem in natural language processing. The problem of word sense disambiguation can be considered as a typical classification problem. Different information is sel...
详细信息
Knowledge of noun phrase anaphoricity might be profitably exploited in coreference resolution to bypass the resolution of non-anaphoric noun phrases. However, it is surprising to notice that recent attempts to incorpo...
详细信息
In this paper, we employ the centering theory in pronoun resolution from the semantic perspective. First, diverse semantic role features with regard to different predicates in a sentence are explored. Moreover, given ...
详细信息
The game playing is an import domain of heuristic search, and its procedure is represented by a special and/or tree. Alpha-beta pruning is always used for problem solving by searching the game-playing-tree. In this pa...
详细信息
This paper proposes a novel method for facial expression recognition based on neural network ensemble. The facial expression features are extracted firstly through multi-expression eigenspace analysis, and then severa...
详细信息
暂无评论