نتایج جستجو برای: omission
تعداد نتایج: 6107 فیلتر نتایج به سال:
Abstract We provide a model theoretical and tree property-like characterization of $\lambda $ - $\Pi ^1_1$ -subcompactness supercompactness. explore the behavior these combinatorial principles at accessible cardinals.
In secure multi-party computation, the different ways in which the adversary can control the corrupted players are described by different corruption types. The three most common corruption types are active corruption (the adversary has full control over the corrupted player), passive corruption (the adversary sees what the corrupted player sees) and fail-corruption (the adversary can force the ...
In this paper, we address an issue that arises when the background knowledge used by explanationbased learning is incorrect. In particular, we consider the problems that can be caused by a domain theory that may be overly specific. Under this condition, generalizations formed by explanation-based learning will make errors of omission when they are relied upon to make predictions or explanations...
Let us stipulate at the outset that “omission” refers to any action or event that doesn’t occur. In contrast, one might use “omission” to denote exclusively intentional failures (my refraining from picking up the dry cleaning), exclusively agent-involving failures (the gardener’s failure to water the plant), or failures with an explicitly normative dimension (as in Billy not following through o...
The following picture shows the test omission rate and predicted area as a function of the cumulative threshold, averaged over the replicate runs. The omission rate should be close to the predicted omission, because of the definition of the cumulative threshold. The next picture is the receiver operating characteristic (ROC) curve for the same data, again averaged over the replicate runs. Note ...
Research on omission neglect has demonstrated that consumers are insensitive to many different types of missing, unmentioned, and unknown information. However, there is no prior research examining the role that vividness plays in omission detection and persuasion. The present research distinguishes between vividness in imagery and vividness of verbal information and shows that vividness in imag...
ly spoken, error behaviour is one aspect of the adversary behaviour as errors can be assigned to the adversary. It defines the way an adversary influences a protocol, the methods it can use. A categorisation is done by [HH91], where crash failures, sending omission, receiving omission, general omission failures, and, finally, arbitrary failures are differentiated. In case errors occur arbitrari...
2. Pattern omission method Abstract: In this paper, we present the so-called scalable pattern omission method for a deblocking filter. This exploits specific characteristics of the human visual system. The baseline of our method is to reduce processing time of the deblocking filter. In the development of the H.264/AVC decoder, the processing Deblocking filter consumes the most computation resou...
We detect errors in Korean post-positional particle usage, focusing on optimizing omission detection, as omissions are the single-biggest factor in particle errors for learners of Korean. We also develop a system for predicting the correct choice of a particle. For omission detection, we model the task largely on English grammatical error detection, but employ Korean-specific features and filte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید