The paper points out the relationships and similarities between some problems in the theory of covering codes and the determination of sparse functional expressions for logic functions. Based on these connections we p...
详细信息
We present a hierarchical chunk-to-string translation model, which can be seen as a compromise between the hierarchical phrasebased model and the tree-to-string model, to combine the merits of the two models. With the...
详细信息
Decoding algorithms for syntax based machine translation suffer from high computational complexity, a consequence of intersecting a language model with a context free grammar. Left-to-right decoding, which generates t...
详细信息
This paper considers anti-windup design for linear systems subject to actuator *** anti-windup gains are designed for activations immediately at the occurrence actuator saturation,after the saturation has reached a ce...
详细信息
This paper considers anti-windup design for linear systems subject to actuator *** anti-windup gains are designed for activations immediately at the occurrence actuator saturation,after the saturation has reached a certain level and in anticipation of the occurrence of saturation,*** design is based on the minimization of L 2 gain from the disturbance to the controlled output of the resulting closed-loop *** anti-windup scheme involves a single anti-windup loop for immediate activation.A recent innovation is to design a single anti-windup loop for delayed or anticipatory activation,as well as to design two anti-windup gains,one for immediate activation and one for delayed *** design of three anti-windup gains for three different activations is shown through simulation to lead to significant further performance improvement over the previous activation schemes.
We present an integrated measurement and defect prediction tool: Dione. Our tool enables organizations to measure, monitor, and control product quality through learning based defect prediction. Similar existing tools ...
详细信息
Convolution kernels support the modeling of complex syntactic information in machinelearning tasks. However, such models are highly sensitive to the type and size of syntactic structure used. It is therefore an import...
详细信息
A variant of spiking neural P systems was recently investigated by the authors, using astrocytes that have excitatory and inhibitory influence on synapses. In this work, we consider this system in the non-synchronized...
详细信息
Privacy-Preserving Computational Geometry (PPCG) is a special Secure Multi-party Computation, which is a hot research in information security. This paper presented a special PPCG problem of secure two-party computing ...
详细信息
Deep Web databases contain more than 90% of pertinent information of the Web. Despite their importance, users don't profit of this treasury. Many deep web services are offering competitive services in term of pric...
详细信息
暂无评论