نتایج جستجو برای: sensitive analyze

تعداد نتایج: 518316  

2012
Georgiana Dinu Stefan Thater Sören Laue

This paper compares a number of recently proposed models for computing context sensitive word similarity. We clarify the connections between these models, simplify their formulation and evaluate them in a unified setting. We show that the models are essentially equivalent if syntactic information is ignored, and that the substantial performance differences previously reported disappear to a lar...

2015
Xinye Xu Thomas H. Loftus Matthew J. Smith John L. Hall Alan Gallagher Jun Ye

Journal: :Statistics and Computing 2008
David Bremner Dan Chen John Iacono Stefan Langerman Pat Morin

The Tukey depth (Tukey 1975) of a point p with respect to a finite set S of points is the minimum number of elements of S contained in any closed halfspace that contains p. Algorithms for computing the Tukey depth of a point in various dimensions are considered. The running times of these algorithms depend on the value of the output, making them suited to situations, such as outlier removal, wh...

2014
Nicholas Shipp Frédéric Vallée-Tourangeau Susan Anthony

Recent theories of semantic memory have proposed that concepts are grounded in sensorimotor activity and mediated by the context from which the knowledge is drawn (Barsalou, 1999, 2003, 2008). Conceptual knowledge draws upon information from all modalities and therefore includes knowledge of associated object actions linked with both function and general movement (Bub, Masson, & Cree, 2008). Th...

2010
Maribel Romero Tilman Becker Emily Bender Pierre Boullier John Chen David Chiang Eric de la Clergerie Claire Gardent Chung-hye Han Karin Harbusch Aravind Joshi Laura Kallmeyer Marco Kuhlmann Alessandro Mazzei David McDonald Martha Palmer Owen Rambow James Rogers Anoop Sarkar Sylvain Schmitz Hiroyuki Seki Vijay Shanker Mark Steedman Amanda Stent Matthew Stone Bonnie Webber Fei Xia Naoki Yoshinaga

This tutorial will describe the use of a factored probabilistic sequence model for parsing speech and text using a bounded store of three to four incomplete constituents over time, in line with recent estimates of human shortterm working memory capacity. This formulation uses a grammar transform to minimize memory usage during parsing. Incremental operations on incomplete constituents in this t...

2017
Alexander Meduna Jakub Martisko

Are propagating scattered context grammars as powerful as context sensitive grammars? This question customarily referred to as the L (PSCG) = L (CS) (see [4]) problem, represents a long standing open problem in formal language theory. The present paper reformulates and answers this question in terms of CD grammar systems. More precisely, the paper introduces CD grammar systems whose components ...

2001
Harry S. Delugach Thomas H. Hinke Asha J. Chandrasekhar

Conceptual graphs are applied to a problem in database inference known as secondpath analysis. A sensitive target is proposed, namely to keep secret that a certain company is working on a certain project. Typically available non-sensitive information is introduced in the form of relational database schemata. These schemata are then expressed as conceptual graphs, followed by a series of joins w...

Journal: :Russian Law Journal 2023

This research aims to analyze (1) the influence of specific approach on implementation stunting management policy in Boalemo, (2) sensitive and (3) community health behaviors Boalemo. The method was a survey using quantitative with path analysis. Data were collected through questionnaire distribution. conclusions Specific influenced Boalemo by 82.7%, Sensitive 82.3%, Community 71.9%. That was, ...

2007
Kesavan Shanmugam Allen D. Malony Bernd Mohr

Performance Extrapolation is the process of evaluating the performance of a parallel program in a target execution environment using performance information obtained for the same program in a different execution environment. Performance extrapolation techniques are suited for rapid performance tuning of parallel programs, particularly when the target environment is unavailable. This paper descr...

Journal: :International Journal of Advanced Computer Science and Applications 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید