نتایج جستجو برای: sensitive analyze
تعداد نتایج: 518316 فیلتر نتایج به سال:
This paper compares a number of recently proposed models for computing context sensitive word similarity. We clarify the connections between these models, simplify their formulation and evaluate them in a unified setting. We show that the models are essentially equivalent if syntactic information is ignored, and that the substantial performance differences previously reported disappear to a lar...
The Tukey depth (Tukey 1975) of a point p with respect to a finite set S of points is the minimum number of elements of S contained in any closed halfspace that contains p. Algorithms for computing the Tukey depth of a point in various dimensions are considered. The running times of these algorithms depend on the value of the output, making them suited to situations, such as outlier removal, wh...
Recent theories of semantic memory have proposed that concepts are grounded in sensorimotor activity and mediated by the context from which the knowledge is drawn (Barsalou, 1999, 2003, 2008). Conceptual knowledge draws upon information from all modalities and therefore includes knowledge of associated object actions linked with both function and general movement (Bub, Masson, & Cree, 2008). Th...
This tutorial will describe the use of a factored probabilistic sequence model for parsing speech and text using a bounded store of three to four incomplete constituents over time, in line with recent estimates of human shortterm working memory capacity. This formulation uses a grammar transform to minimize memory usage during parsing. Incremental operations on incomplete constituents in this t...
Are propagating scattered context grammars as powerful as context sensitive grammars? This question customarily referred to as the L (PSCG) = L (CS) (see [4]) problem, represents a long standing open problem in formal language theory. The present paper reformulates and answers this question in terms of CD grammar systems. More precisely, the paper introduces CD grammar systems whose components ...
Conceptual graphs are applied to a problem in database inference known as secondpath analysis. A sensitive target is proposed, namely to keep secret that a certain company is working on a certain project. Typically available non-sensitive information is introduced in the form of relational database schemata. These schemata are then expressed as conceptual graphs, followed by a series of joins w...
This research aims to analyze (1) the influence of specific approach on implementation stunting management policy in Boalemo, (2) sensitive and (3) community health behaviors Boalemo. The method was a survey using quantitative with path analysis. Data were collected through questionnaire distribution. conclusions Specific influenced Boalemo by 82.7%, Sensitive 82.3%, Community 71.9%. That was, ...
Performance Extrapolation is the process of evaluating the performance of a parallel program in a target execution environment using performance information obtained for the same program in a different execution environment. Performance extrapolation techniques are suited for rapid performance tuning of parallel programs, particularly when the target environment is unavailable. This paper descr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید