Learning how to exploit sources of information

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Exploit Local Information When Distilling Entanglement

Distillation protocols enable generation of high quality entanglement even in the presence of noise. Existing protocols ignore the presence of local information in mixed states produced from some noise sources such as photon loss, amplitude damping or thermalization. We propose new protocols that exploit local information in mixed states. Our protocols converge to higher fidelities in fewer rou...

متن کامل

How and why exploit tweet's location information?

Tweets exchanged over the Internet represent an important source of information, even if their characteristics make them difficult to analyze (e.g. a maximum of 140 characters, etc.). In addition associated to every message, lots of information such as location or date, are available. Taking into account these meta-information can be very useful for the decision maker. Obviously, due to the cha...

متن کامل

How to exploit prior information in low-complexity models

Compressed Sensing refers to extracting a lowdimensional structured signal of interest from its incomplete random linear observations. A line of recent work has studied that, with the extra prior information about the signal, one can recover the signal with much fewer observations. For this purpose, the general approach is to solve weighted convex function minimization problem. In such settings...

متن کامل

Learning How to Exploit Proximal Force Sensing: a Comparison Approach

We present an evaluation of different techniques for the estimation of forces and torques measured by a single six-axis force/torque sensor placed along the kinematic chain of a humanoid robot arm. In order to retrieve the external forces and detect possible contact situations, the internal forces must be estimated. The prediction performance of an analytically derived dynamic model as well as ...

متن کامل

How to Exploit Ontologies in Trust Negotiation

The World Wide Web makes it easy to share information and resources, but offers few ways to limit the manner in which these resources are shared. The specification and automated enforcement of security-related policies offer promise as a way of providing controlled sharing, but few tools are available to assist in policy specification and management, especially in an open system such as the Web...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Memory & Cognition

سال: 2018

ISSN: 0090-502X,1532-5946

DOI: 10.3758/s13421-018-0881-x