نتایج جستجو برای: lalearning automat
تعداد نتایج: 215 فیلتر نتایج به سال:
We address the intractable multi-armed bandit problem with switching costs, for which Asawa and Teneketzis introduced in [M. Asawa and D. Teneketzis. 1996. Multi-armed bandits with switching penalties. IEEE Trans. Automat. Control, 41 328–348] an index that partially characterizes optimal policies, attaching to each project state a “continuation index” (its Gittins index) and a “switching index...
This paper summarizes recent research on networked virtual computing in the NICL lab at Duke. Over the past few years, we have constructed a service-oriented substrate for networked sharing and adaptive middleware environments based on a virtual on-demand computing. The goal of the project is to develop protocols and tools that can link together virtual computing clusters at different sites, an...
The purpose of this paper is to present a theoretic and numerical study of utilizing squeezing and phase shift in coherent feedback control of linear quantum optical systems. A quadrature representation with built-in phase shifters is proposed for such systems. Fundamental structural characterizations of linear quantum optical systems are derived in terms of the new quadrature representation. T...
A multiplexed assay based on the codetection of nucleic acids and antibodies in human serum infected by human immunodeficiency virus (HIV), hepatitis B virus (HBV) or hepatitis C virus was proposed. The combined immuno- and oligosorbent array (CombOLISA) microarray is prepared in 96-well standard microplates by spotting (1). nucleic probes specific for a virus genome, (2). viral proteins for th...
How does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital for outlier detection (terrorist networks, or illegal money-laundering rings), forecasting, and simulations (“how will a computer virus spread?”). The heart of the problem is finding the properties of real graphs that seem to pe...
In this paper, we address a challenging task of automat generation of UML class models. In conventional CASE tools, the export facility does not export the graphical information that explains the way UML class elements (such as classes, associations, etc) are represented and laid out in diagrams. We address them problem by presenting a novel approach for automatic generation of UML class diagra...
Automat ic text tagging is an important component in higher level analysis of text corpora, and its output can be used in many natural language processing applications. In languages like Turkish or Finnish, with agglutinative morphology, morphological disambiguation is a very crucial process in tagging, as the structures of many lexical forms are morphologically ambiguous. This paper describes ...
Extensions of the traditional atomic transaction model are needed to support the development of multi system applications or work ows that ac cess heterogeneous databases and legacy applica tion systems Most extended transaction model s use conditions involving events or dependencies between transactions Intertask dependencies can serve as a uniform framework for de ning extend ed transaction m...
This paper presents the results of a s tudy on the semantic constraints imposed on lexical choice by certain contextual indicators. We show how such indicators are computed and how correlations between them and the choice of a noun phrase description of a named entity can be automatically established using supervised learning. Based on this correlation, we have developed a technique for automat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید