1,915 Hits in 1e+01 sec

Isolated and Connected Word Recognition--Theory and Selected Applications

L. Rabiner, S. Levinson
1981 IRE Transactions on Communications Systems  
In particular, we elaborate on a simple formalization of grammar which both dramatically increases the versatility and robustness of our speech-recognition machines and provides insights into the role  ...  The art and science of speech recognition have been advanced to the state where it is now possible to communicate reliably with a computer by speaking to it in a disciplined manner using a vocabulary of  ...  ACKNOWLEDGMENT The authors would like to acknowledge the contributions of several of their colleagues to the work described in this paper. Dr. James L.  ... 
doi:10.1109/tcom.1981.1095031 fatcat:gs6p2sgipvhfzbwemjkeo2h25m

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
In most communication systems, information encryption and error correction are always independent. While joint encryption and error correction codes combine these two processes into one.  ...  Through such combination, the advantages of AP in time costs and the advantages of NC in accuracy have been adopted.  ...  CONCLUSIONS In this paper, we propose a hybrid approach that combines the evidence theory with rough sets for ISS risk assessment.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

Object Management Systems 1

Aleks Göllü, Akash Deshpande
1996 IFAC Proceedings Volumes  
The OMS development methodology consists of four stages: Domain Customization, System Architecture, Application Development, and System Test.  ...  SmartAHS is used to capture different Automated Highway System (AHS) designs and benchmark scenarios and to generate performance metrics through micro-simulation of the designs.  ...  , coordination of distributed control agents, combined discrete and continuous dynamical systems, known as hybrid systems, and their control and veri cation, In the layered control architecture proposed  ... 
doi:10.1016/s1474-6670(17)58556-0 fatcat:ltmi6kwf2fa2hiyf4skvtvy76m

Driven by Data or Derived through Physics? A Review of Hybrid Physics Guided Machine Learning Techniques with Cyber-Physical System (CPS) Focus

Rahul Rai, Chandan K. Sahu
2020 IEEE Access  
We refer to the paradigm that combines MB approaches with ML as hybrid learning methods.  ...  An additional feature of this survey is that the hybrid modeling work has been discussed with a focus on modeling cyber-physical systems.  ...  Then the equations will be in the following form: h t, x i , y j , ∂ k y j ∂t k , ∂ l y j ∂x l i = 0 (3) where k, l = 1, 2, . . . p are the indices of the differential operators.  ... 
doi:10.1109/access.2020.2987324 fatcat:xaltpychlfcz7cec4jrdadhxem

A framework of models for QoS-oriented adaptive deployment of multi-layer communication services in group cooperative activities

K. Guennoun, K. Drira, N. Van Wambeke, C. Chassot, F. Armando, E. Exposito
2008 Computer Communications  
They are graphs containing only vertices of T 817 and obtained from AX by applying a combination of produc-818 tions in P.  ...  It is easy to implement but limits the adaptabil- and Cactus) and the hierarchical model (X-Kernel [14] and APPIA). 176 ETP follows a hybrid approach combining both models [5] .  ... 
doi:10.1016/j.comcom.2008.04.002 fatcat:pk7qzm5thbenfekf737bgwq35q

Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems [chapter]

André Sieber, Karsten Walther, Stefan Nürnberger, Jörg Nolte
2009 Lecture Notes in Computer Science  
Listing 3: Casting between pointers to different structure types $ make k l e e n e t t e s t s t r u c t KLEE: WARNING: Struct types don ' t match KLEE: %s t r u c t . NewRoute * −> %s t r u c t .  ...  However, when treating applications with such requirements as in the medical field, several problems arise, triggering the need of an efficient enhancement of the IEEE 802.15.4 protocol including the fine  ...  Among the possible combinations, only those K combinations that provide a lower number of hops are stored.  ... 
doi:10.1007/978-3-642-02118-3_2 fatcat:prjsfyqcojcnpcetw7vfnvqwpy

Tool construction for the British Airways SEE with the O2 ODBMS

Wolfgang Emmerich, Jim Arlow, Joëlle Madec, Mark Phoenix
1997 Theory and Practice of Object Systems  
These are inter-document consistency handling, version and con guration management and cooperative work.  ...  Software engineering environments SEE support the construction and maintenance of large-scale software systems.  ...  We also thank Claude Delobel, Sabine Sachweh, Wilhelm Sch afer and Jim Welsh for their suggestions on the version manager and Sabine Habert for her e ort in getting the object-level concurrency control  ... 
doi:10.1002/(sici)1096-9942(1997)3:3<213::aid-tapo3>;2-v fatcat:x2woao77jna53fqwufojrbbk5a

Tool construction for the British Airways SEE with theO2 ODBMS

Wolfgang Emmerich, Jim Arlow, Jo�lle Madec, Mark Phoenix
1997 Theory and Practice of Object Systems  
These are inter-document consistency handling, version and con guration management and cooperative work.  ...  Software engineering environments SEE support the construction and maintenance of large-scale software systems.  ...  We also thank Claude Delobel, Sabine Sachweh, Wilhelm Sch afer and Jim Welsh for their suggestions on the version manager and Sabine Habert for her e ort in getting the object-level concurrency control  ... 
doi:10.1002/(sici)1096-9942(1997)3:3<213::aid-tapo3>;2-u fatcat:mkbmcaf7k5afnkxfrreco2iaum

Recent Advances in Deep Learning Based Dialogue Systems: A Systematic Survey [article]

Jinjie Ni, Tom Young, Vlad Pandelea, Fuzhao Xue, Erik Cambria
2022 arXiv   pre-print
We comprehensively review state-of-the-art research outcomes in dialogue systems and analyze them from two angles: model type and system type.  ...  Specifically, from the angle of model type, we discuss the principles, characteristics, and applications of different models that are widely used in dialogue systems.  ...  When predicting the token at time step t, it combines the probabilistic models of generate-mode and copy-mode: P (y t |s t , y t−1 , c t , M ) = P g (y t |s t , y t−1 , c t , M ) + P c (y t |s t , y t−  ... 
arXiv:2105.04387v5 fatcat:yd3gqg45rjgzxbiwfdlcvf3pye

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source  ...  The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews  ...  Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm

Big Steps Towards Query Eco-Processing - Thinking Smart
Les Grandes Étapes vers l'éco-traitement des requêtes - Thinking Smart

Simon Pierre Dembele, Ladjel Bellatreche, Carlos Ordonez, Nabil Gmati, Mathieu Roche, Tri Nguyen-Huu, Laurent Debreu
2021 ARIMA  
They can be modified to take into account the energetical cost of query plans by using energy-based cost models with the aim of reducing the power consumption of computer systems.  ...  To this end, we study in depth the operating principle of the selected DBMS and present an analysis comparing the performance time and energy consumption of typical queries in the TPC benchmark.  ...  Also, we plan to apply the same approach to other systems and compare them with monetDB, PostgreSQL, and Hyrise systems.  ... 
doi:10.46298/arima.6767 fatcat:v3ivitm74je4tdb27c6y6a3zga

Cumulative index volumes 101–150

1995 Theoretical Computer Science  
Lowe, Parallel and distributed derivations in the single-pushout Eiter, T. and G.  ...  Kari, Some hierarchies for the communication complexity measures of cooperating grammar systems 127 (1) (1994) 123-147 HromkoviE, J., C.-D. Jeschke and B.  ...  K., P. Narendran, F. Otto and L. Zhang, On weakly confluent monadic string-rewriting systems 113 (1)(1993) 119-165 Madonia, M., S. Salemi and T.  ... 
doi:10.1016/0304-3975(95)90003-9 fatcat:nu4xbvgzrvbfvicemt4sviortu

Memory and attention in deep learning [article]

Hung Le
2021 arXiv   pre-print
Their descendants with more complicated modeling techniques (a.k.a deep learning) have been successfully applied to many practical problems and demonstrated the importance of memory in the learning process  ...  The aim of this thesis is to advance the understanding on memory and attention in deep learning.  ...  Clearly, Eq. (8.3) is proportional to an MoG with K 1 · K 2 modes Theorem C.1. T t=1 g t (x) = T t=1 K i=1 π i t g i t (x) is a scaled MoG. Proof.  ... 
arXiv:2107.01390v1 fatcat:nxxjns7qdfb2fhe53qwwylagui

Modeling Self-Assembly Across Scales: The Unifying Perspective of Smart Minimal Particles

Massimo Mastrangeli, Grégory Mermoud, Alcherio Martinoli
2011 Micromachines  
We outline the opposite converging tendencies, namely M/NEMS smarting and robotic minimalism, by reviewing each field's literature with specific focus on self-assembling systems.  ...  At the same time, a large body of robotic research called swarm robotics is concerned with the design and the control of large ensembles of robots of decreasing size and complexity.  ...  Acknowledgements Massimo Mastrangeli and Grégory Mermoud are sponsored by the SelfSys project funded by the Swiss research initiative  ... 
doi:10.3390/mi2020082 fatcat:lgwr25lft5d7hopkd3y37q4ubu

Computational challenges in structural and functional genomics

T. Head-Gordon, J. C. Wooley
2001 IBM Systems Journal  
The goal of computational biology in the early twenty-first century is to link the various genome sequencing projects to a high-throughput effort in complete structural and functional annotation of whole  ...  will be required to achieve our goals, and to outline the directions that will likely be taken in the postgenomic era.  ...  genomics to systems modeling: Modeling the cellular program"-Adam Arkin and Denise Wolf; "Other simulation issues for computational biology"-Mike Colvin, Terry Gaasterland, and Charles Musick.  ... 
doi:10.1147/sj.402.0265 fatcat:xfkz65qoond6zouw6rsbjltwqy
« Previous Showing results 1 — 15 out of 1,915 results