نتایج جستجو برای: key word bpnts

تعداد نتایج: 651132  

2011
MURRAY R. BREMNER JUANA SÁNCHEZ-ORTEGA

We define Leibniz triple systems in a functorial manner using the algorithm of Kolesnikov and Pozhidaev which converts identities for algebras into identities for dialgebras; this algorithm is a concrete realization of the white Manin product introduced by Vallette by the permutad Perm introduced by Chapoton. We verify that Leibniz triple systems are natural analogues of Lie triple systems by s...

Journal: :Theor. Comput. Sci. 2004
Orna Kupferman Moshe Y. Vardi

In the automata-theoretic approach to model checking we check the emptiness of the product of a system with an automaton for the complemented specification. This gives rise to two automata-theoretic problems: complementation of word automata, which is used in order to generate , and the emptiness problem, to which model checking is reduced. Both problems have numerous other applications, and ha...

Journal: :IJDMMM 2013
Violeta Seretan Eric Wehrli

Concordancers are tools that display the contexts of a given word in a corpus. Also called key word in context (KWIC), these tools are nowadays indispensable in the work of lexicographers, linguists, and translators. We present an enhanced type of concordancer that integrates syntactic information on sentence structure as well as statistical information on word cooccurrence in order to detect a...

2012
Hervé Jégou Ondrej Chum

The paper addresses large scale image retrieval with short vector representations. We study dimensionality reduction by Principal Component Analysis (PCA) and propose improvements to its different phases. We show and explicitly exploit relations between i) mean subtraction and the negative evidence, i.e., a visual word that is mutually missing in two descriptions being compared, and ii) the axi...

Journal: :IEEE Trans. Information Theory 2000
A. Roger Hammons Hesham El Gamal

The design of space–time codes to achieve full spatial diversity over fading channels has largely been addressed by handcrafting example codes using computer search methods and only for small numbers of antennas. The lack of more general designs is in part due to the fact that the diversity advantage of a code is the minimum rank among the complex baseband differences between modulated codeword...

2000
Masayuki Takeda Tetsuya Matsumoto Tomoko Fukuda Ichiro Nanri

We attempt to extract characteristic expressions from literary works. That is, our problem is, given literary works by a particular writer as positive examples and works by another writer as negative examples, to find expressions that appear frequently in the positive examples but do not so in the negative examples. It is considered as a special case of the optimal pattern discovery from textua...

Journal: :IEEE Trans. Systems, Man, and Cybernetics, Part C 2003
Francesc Sebé Josep Domingo-Ferrer

Intellectual property protection of multimedia content is essential to the successful deployment of Internet content delivery platforms. There are two general approaches to multimedia copy protection: copy prevention and copy detection. Past experience shows that only copy detection based on mark embedding techniques looks promising. Multimedia fingerprinting means embedding a different buyer-i...

2013
Angelina Ivanova Stephan Oepen Lilja Øvrelid

In this paper we focus on practical issues of data representation for dependency parsing. We carry out an experimental comparison of (a) three syntactic dependency schemes; (b) three data-driven dependency parsers; and (c) the influence of two different approaches to lexical category disambiguation (aka tagging) prior to parsing. Comparing parsing accuracies in various setups, we study the inte...

1996
Brendan J. Frey

| In this document, I rst review the theory behind bits-back coding (aka. free energy coding) (Frey and Hinton 1996) and then describe the interface to C-language software that can be used for bits-back coding. This method is a new approach to the problem of optimal compression when a source code produces multiple codewords for a given symbol. It may seem that the most sensible codeword to use ...

2002
Cheng Luo Muriel Médard

In wideband systems that decorrelate in time and frequency, capacity can be reached in the limit of infinite bandwidth by using impulsive frequency-shift keying with vanishingly small duty cycle. The richness of the codewords is then created through the large bandwidth. We show that frequencyshift keying with small duty cycle, using traditional random coding arguments, can achieve rates close t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید