A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Isolated and Connected Word Recognition--Theory and Selected Applications
1981
IRE Transactions on Communications Systems
In particular, we elaborate on a simple formalization of grammar which both dramatically increases the versatility and robustness of our speech-recognition machines and provides insights into the role ...
The art and science of speech recognition have been advanced to the state where it is now possible to communicate reliably with a computer by speaking to it in a disciplined manner using a vocabulary of ...
ACKNOWLEDGMENT The authors would like to acknowledge the contributions of several of their colleagues to the work described in this paper. Dr. James L. ...
doi:10.1109/tcom.1981.1095031
fatcat:gs6p2sgipvhfzbwemjkeo2h25m
Fake BTS Attacks of GSM System on Software Radio Platform
2012
Journal of Networks
In most communication systems, information encryption and error correction are always independent. While joint encryption and error correction codes combine these two processes into one. ...
Through such combination, the advantages of AP in time costs and the advantages of NC in accuracy have been adopted. ...
CONCLUSIONS In this paper, we propose a hybrid approach that combines the evidence theory with rough sets for ISS risk assessment. ...
doi:10.4304/jnw.7.2.275-281
fatcat:3ejjimllcvewjeifopbvhl3zmi
Object Management Systems 1
1996
IFAC Proceedings Volumes
The OMS development methodology consists of four stages: Domain Customization, System Architecture, Application Development, and System Test. ...
SmartAHS is used to capture different Automated Highway System (AHS) designs and benchmark scenarios and to generate performance metrics through micro-simulation of the designs. ...
, coordination of distributed control agents, combined discrete and continuous dynamical systems, known as hybrid systems, and their control and veri cation, In the layered control architecture proposed ...
doi:10.1016/s1474-6670(17)58556-0
fatcat:ltmi6kwf2fa2hiyf4skvtvy76m
Driven by Data or Derived through Physics? A Review of Hybrid Physics Guided Machine Learning Techniques with Cyber-Physical System (CPS) Focus
2020
IEEE Access
We refer to the paradigm that combines MB approaches with ML as hybrid learning methods. ...
An additional feature of this survey is that the hybrid modeling work has been discussed with a focus on modeling cyber-physical systems. ...
Then the equations will be in the following form: h t, x i , y j , ∂ k y j ∂t k , ∂ l y j ∂x l i = 0 (3) where k, l = 1, 2, . . . p are the indices of the differential operators. ...
doi:10.1109/access.2020.2987324
fatcat:xaltpychlfcz7cec4jrdadhxem
A framework of models for QoS-oriented adaptive deployment of multi-layer communication services in group cooperative activities
2008
Computer Communications
They are graphs containing only vertices of T 817 and obtained from AX by applying a combination of produc-818 tions in P. ...
It is easy to implement but limits the adaptabil- and Cactus) and the hierarchical model (X-Kernel [14] and APPIA). 176 ETP follows a hybrid approach combining both models [5] . ...
doi:10.1016/j.comcom.2008.04.002
fatcat:pk7qzm5thbenfekf737bgwq35q
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems
[chapter]
2009
Lecture Notes in Computer Science
Listing 3: Casting between pointers to different structure types $ make k l e e n e t t e s t s t r u c t KLEE: WARNING: Struct types don ' t match KLEE: %s t r u c t . NewRoute * −> %s t r u c t . ...
However, when treating applications with such requirements as in the medical field, several problems arise, triggering the need of an efficient enhancement of the IEEE 802.15.4 protocol including the fine ...
Among the possible combinations, only those K combinations that provide a lower number of hops are stored. ...
doi:10.1007/978-3-642-02118-3_2
fatcat:prjsfyqcojcnpcetw7vfnvqwpy
Tool construction for the British Airways SEE with the O2 ODBMS
1997
Theory and Practice of Object Systems
These are inter-document consistency handling, version and con guration management and cooperative work. ...
Software engineering environments SEE support the construction and maintenance of large-scale software systems. ...
We also thank Claude Delobel, Sabine Sachweh, Wilhelm Sch afer and Jim Welsh for their suggestions on the version manager and Sabine Habert for her e ort in getting the object-level concurrency control ...
doi:10.1002/(sici)1096-9942(1997)3:3<213::aid-tapo3>3.3.co;2-v
fatcat:x2woao77jna53fqwufojrbbk5a
Tool construction for the British Airways SEE with theO2 ODBMS
1997
Theory and Practice of Object Systems
These are inter-document consistency handling, version and con guration management and cooperative work. ...
Software engineering environments SEE support the construction and maintenance of large-scale software systems. ...
We also thank Claude Delobel, Sabine Sachweh, Wilhelm Sch afer and Jim Welsh for their suggestions on the version manager and Sabine Habert for her e ort in getting the object-level concurrency control ...
doi:10.1002/(sici)1096-9942(1997)3:3<213::aid-tapo3>3.0.co;2-u
fatcat:mkbmcaf7k5afnkxfrreco2iaum
Recent Advances in Deep Learning Based Dialogue Systems: A Systematic Survey
[article]
2022
arXiv
pre-print
We comprehensively review state-of-the-art research outcomes in dialogue systems and analyze them from two angles: model type and system type. ...
Specifically, from the angle of model type, we discuss the principles, characteristics, and applications of different models that are widely used in dialogue systems. ...
When predicting the token at time step t, it combines the probabilistic models of generate-mode and copy-mode: P (y t |s t , y t−1 , c t , M ) = P g (y t |s t , y t−1 , c t , M ) + P c (y t |s t , y t− ...
arXiv:2105.04387v5
fatcat:yd3gqg45rjgzxbiwfdlcvf3pye
Intrusion-Detection Systems
[chapter]
2012
Handbook of Computer Networks
Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source ...
The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews ...
Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the ...
doi:10.1002/9781118256107.ch26
fatcat:aeidzkegvfc27dqqmztiayv3dm
Big Steps Towards Query Eco-Processing - Thinking Smart
Les Grandes Étapes vers l'éco-traitement des requêtes - Thinking Smart
2021
ARIMA
Les Grandes Étapes vers l'éco-traitement des requêtes - Thinking Smart
They can be modified to take into account the energetical cost of query plans by using energy-based cost models with the aim of reducing the power consumption of computer systems. ...
To this end, we study in depth the operating principle of the selected DBMS and present an analysis comparing the performance time and energy consumption of typical queries in the TPC benchmark. ...
Also, we plan to apply the same approach to other systems and compare them with monetDB, PostgreSQL, and Hyrise systems. ...
doi:10.46298/arima.6767
fatcat:v3ivitm74je4tdb27c6y6a3zga
Cumulative index volumes 101–150
1995
Theoretical Computer Science
Lowe, Parallel and distributed derivations in the single-pushout Eiter, T. and G. ...
Kari, Some hierarchies for the communication complexity measures of cooperating grammar systems 127 (1) (1994) 123-147 HromkoviE, J., C.-D. Jeschke and B. ...
K., P. Narendran, F. Otto and L. Zhang, On weakly confluent monadic string-rewriting systems 113 (1)(1993) 119-165 Madonia, M., S. Salemi and T. ...
doi:10.1016/0304-3975(95)90003-9
fatcat:nu4xbvgzrvbfvicemt4sviortu
Memory and attention in deep learning
[article]
2021
arXiv
pre-print
Their descendants with more complicated modeling techniques (a.k.a deep learning) have been successfully applied to many practical problems and demonstrated the importance of memory in the learning process ...
The aim of this thesis is to advance the understanding on memory and attention in deep learning. ...
Clearly, Eq. (8.3) is proportional to an MoG with K 1 · K 2 modes Theorem C.1. T t=1 g t (x) = T t=1 K i=1 π i t g i t (x) is a scaled MoG. Proof. ...
arXiv:2107.01390v1
fatcat:nxxjns7qdfb2fhe53qwwylagui
Modeling Self-Assembly Across Scales: The Unifying Perspective of Smart Minimal Particles
2011
Micromachines
We outline the opposite converging tendencies, namely M/NEMS smarting and robotic minimalism, by reviewing each field's literature with specific focus on self-assembling systems. ...
At the same time, a large body of robotic research called swarm robotics is concerned with the design and the control of large ensembles of robots of decreasing size and complexity. ...
Acknowledgements Massimo Mastrangeli and Grégory Mermoud are sponsored by the SelfSys project funded by the Swiss research initiative Nano-Tera.ch. ...
doi:10.3390/mi2020082
fatcat:lgwr25lft5d7hopkd3y37q4ubu
Computational challenges in structural and functional genomics
2001
IBM Systems Journal
The goal of computational biology in the early twenty-first century is to link the various genome sequencing projects to a high-throughput effort in complete structural and functional annotation of whole ...
will be required to achieve our goals, and to outline the directions that will likely be taken in the postgenomic era. ...
genomics to systems modeling: Modeling the cellular program"-Adam Arkin and Denise Wolf; "Other simulation issues for computational biology"-Mike Colvin, Terry Gaasterland, and Charles Musick. ...
doi:10.1147/sj.402.0265
fatcat:xfkz65qoond6zouw6rsbjltwqy
« Previous
Showing results 1 — 15 out of 1,915 results