427 Hits in 5.4 sec

Distributed Computing Column 56 Annual Review 2014

Jennifer L. Welch
2014 ACM SIGACT News  
This year, the conference received 141 regular submissions and 23 brief announcements, of which 39 papers and 11 brief announcements were accepted.  ...  To complete the session, there were two brief announcements, both given by Stephan Holzer of MIT.  ... 
doi:10.1145/2696081.2696098 fatcat:byfgwk65yvgnpprwx5ycvov24i

Distributed computing column 48

Idit Keidar
2012 ACM SIGACT News  
Among the topics studied were: how to gather information in a graph when the robots have a limited battery life; oblivious algorithms for asynchronous pattern formation that work under any (feasible) initial  ...  Example problems include pattern formation and sensor placement. Paulo Veríssimo followed up with a systems-oriented account of intrusion tolerance and resilience [8] .  ... 
doi:10.1145/2421119.2421137 fatcat:qivpih26l5fp3ejfmium3bhfdu

A survey of rollback-recovery protocols in message-passing systems

E. N. (Mootaz) Elnozahy, Lorenzo Alvisi, Yi-Min Wang, David B. Johnson
2002 ACM Computing Surveys  
Table 1 provides a brief comparison between the different styles of rollback-recovery protocols.  ...  In asynchronous recovery, a failed process restarts by sending a rollback announcement broadcast or a recovery message broadcast to start a new incarnation [55] [56] .  ... 
doi:10.1145/568522.568525 fatcat:xkop2b77off4xiyqe6yrvhfkv4

Cellular Potts Model: Applications to Vasculogenesis and Angiogenesis [chapter]

Sonja E. M. Boas, Yi Jiang, Roeland M. H. Merks, Sotiris A. Prokopiou, Elisabeth G. Rens
2018 Emergence, Complexity and Computation  
formation, i.e., no patterns would form in a deterministic model [50, 81] .  ...  Apart from its non-locality, another mathematical limitation of the CPM is its required asynchronicity.  ... 
doi:10.1007/978-3-319-65558-1_18 fatcat:wbr23awkjbbf3nqq7l46ymguoy

MEG-SIM: A Web Portal for Testing MEG Analysis Methods using Realistic Simulated and Empirical Data

C. J. Aine, L. Sanfratello, D. Ranken, E. Best, J. A. MacArthur, T. Wallace, K. Gilliam, C. H. Donahue, R. Montaño, J. E. Bryant, A. Scott, J. M. Stephen
2011 Neuroinformatics  
Toward this end, we are announcing the establishment of a website containing an extensive series of realistic simulated data for testing purposes ( megsim/).  ...  Here, we present: 1) a brief overview of the basic types of inverse procedures; 2) the rationale and description of the testbed created; and 3) cases emphasizing functional connectivity (e.g., oscillatory  ...  A brief description of these tools is provided below.  ... 
doi:10.1007/s12021-011-9132-z pmid:22068921 pmcid:PMC3543124 fatcat:zbgabppqibaxpipfkwzu2v7uke

Robust Probabilistic Predictive Syntactic Processing [article]

Brian Roark
2001 arXiv   pre-print
This thesis presents a broad-coverage probabilistic top-down parser, and its application to the problem of language modeling for speech recognition.  ...  We argue that the parsing approach that we have adopted is well-motivated from a psycholinguistic perspective, as a model that captures probabilistic dependencies between lexical items, as part of the  ...  Third, in ways that we will explain, the format of the training corpus was not perfectly aligned with the format of the test corpus.  ... 
arXiv:cs/0105019v1 fatcat:2hh2zt43drazfnpef2m43e6ica

An adaptive opportunistic routing scheme for wireless ad-hoc networks

A.A. Bhorkar, M. Naghshvar, T. Javidi, B.D. Rao
2009 2009 IEEE International Symposium on Information Theory  
In addition to the acknowledgment scheme, d-AdaptOR requires modifications to the 802.11 MAC frame format. Fig. 2 shows the modified MAC frame formats required by d-AdaptOR.  ...  n as the next transmitter or announces the termination decision T in a forwarding (FO) packet.  ... 
doi:10.1109/isit.2009.5205256 dblp:conf/isit/BhorkarRNJ09 fatcat:mefkbrdtmrcb7gknxdsi57giqa

Location, location, location: The importance of spatialization in modeling cooperation and communication

Patrick Grim, Stephanie Wardach, Vincent Beltrani
2006 Interaction Studies  
In the pattern of Fig. 11c the block of 9 shrinks to a static cross formation. This we found in only about 1.5% of our sample.  ...  Probabilistic cellular automaton (PCA) models ... satisfy these criteria.  ... 
doi:10.1075/is.7.1.04gri fatcat:uvqczzuipbhhffellsltvqod2e

The CompWHoB Corpus: Computational Construction, Annotation and Linguistic Analysis of the White House Press Briefings Corpus [chapter]

Fabrizio Esposito, Pierpaolo Basile, Francesco Cutugno, Marco Venuti
Proceedings of the Second Italian Conference on Computational Linguistics CLiC-it 2015  
Change of format UD 1.1 also introduces an extension of the classical CoNLL-X tab separated format, called CoNNL-U.  ...  Furthermore, different standard formats for encoding texts throughout processing are employed: METS/ALTO 5 format for OCRed newspaper issues files, ALTO format for single pages of text with linguistic  ... 
doi:10.4000/books.aaccademia.1467 fatcat:sglsur3fwvdofejg5uhboqk4ie

Machine Learning in Python: Main Developments and Technology Trends in Data Science, Machine Learning, and Artificial Intelligence

Sebastian Raschka, Joshua Patterson, Corey Nolet
2020 Information  
(DAG) that represent the dependencies between arbitrary tasks and executing them either asynchronously or completely lazily.  ...  As a lower-level library for implementing probabilistic models in deep learning and AI research, Pyro [229] provides a probabilistic programming API that is built on top of PyTorch.  ... 
doi:10.3390/info11040193 fatcat:hetp7ngcpbbcpkhdcyowuiiwxe

Increased Availability for Networked Software Services

Peter Clutterbuck
2000 Australasian Journal of Information Systems  
Clustered server availability assumes an asynchronous network consisting of multiple host machines or nodes linked together into an arbitrary network topology.  ...  A brief discussion of future work to implement the quality of service framework concludes the paper.  ... 
doi:10.3127/ajis.v7i2.273 fatcat:wnmgbwsqafe3rem5sp4gc72tke


Alexandru Baltag, Hans P. van Ditmarsch, Lawrence S. Moss
2008 Philosophy of Information  
Balbiani et al [7] call ♦ϕ the "arbitrary announcement" modality, and give a complete axiomatization of the logic of arbitrary announcements, as well as studying its expressivity.  ...  It also gives a very brief look at some of the older work in dynamic epistemic logic.  ... 
doi:10.1016/b978-0-444-51726-5.50015-7 fatcat:4kw77wotobddbbcc34gtle4uxe

Introducing a new paradigm for computational earth science: A Web-object-based approach to earthquake simulations [chapter]

Geoffrey C. Fox, Ken Hurst, Andrea Donnellan, Jay Parker
2000 Geocomplexity and the Physics of Earthquakes  
The field uses phenomenological approaches, which attempt to forecast individual events or more reliably statistical analyses giving probabilistic predictions.  ...  In Section 6, we make brief remarks on other parts of the GEMCI framework and speculate a little on the future.  ...  Objects must be self defining and able to announce themselves universally to a network of registration servers.  ... 
doi:10.1029/gm120p0219 fatcat:ezuf2iy7ezb4roaaauplcefnze

Machine Learning in Python: Main developments and technology trends in data science, machine learning, and artificial intelligence [article]

Sebastian Raschka, Joshua Patterson, Corey Nolet
2020 arXiv   pre-print
(DAG) that represent the dependencies between arbitrary tasks and executing them either asynchronously or completely lazily.  ...  As a lower-level library for implementing probabilistic models in deep learning and AI research, Pyro [227] provides a probabilistic programming API that is built on top of PyTorch.  ... 
arXiv:2002.04803v2 fatcat:lvbczmz7xvbyjhs65zubwluzb4

Analysis of the Cost of Handover in a Mobile Wireless Sensor Network [chapter]

Qian Dong, Waltenegus Dargie
2012 Lecture Notes in Computer Science  
To address the monotonous increment in the backoff window size and to reduce the occurrence frequency of the dwell time, a burst data transmission pattern is adopted to optimize RI-MAC.  ...  Even under an arbitrary network architecture in which the location of nodes and the traffic pattern can be optimally controlled, the network could only provide a per-node throughput of Θ(1/ √ n) (36)  ...  This beacon contains only the source address information (SRC) which announces that the node is ready to receive data packets.  ... 
doi:10.1007/978-3-642-30630-3_28 fatcat:ab47civg5rfz3ccaoa5r3yaptu
« Previous Showing results 1 — 15 out of 427 results