نتایج جستجو برای: integrity
تعداد نتایج: 70331 فیلتر نتایج به سال:
Algorithms for generating referring expressions typically assume that an object in a scenary can be identified through a set of commonly agreed properties. This is a strong assumption, since in reality properties of objects may be perceived differently among people, due to a number of factors including vagueness, knowledge discrepancies, and limited perception capabilities. Taking these discrep...
The summary consists of six sections: 1. Executive summary 2. Importance of location information: lessons learned from three recent rescue operations 3. Why conventional wireless techniques are difficult for underground mines? 4. Potential pitfalls of unconventional wireless techniques 5. Advantages of the microseismic technique 6. Future work on microseismic based trapped miner location technique
Recent Internet developments seem to make a point for passing corrupt data from the link to the network layer and above instead of ensuring data integrity with a checksum and ARQ. We give an overview of these efforts (the UDP Lite and DCCP protocols) and explain which circumstances would justify delivery of erroneous data; clearly, the missing piece in the puzzle is efficient and meaningful int...
The rst part of the paper develops a novel, sortally-based approach to the problem of aspectual composition. The account is argued to be superior on both empirical and computational grounds to previous semantic approaches relying on referential homogeneity tests. While the account is restricted to manner-of-motion verbs, it does cover their interaction with mass terms, amount phrases, locative ...
A learning framework that combines the two frameworks of explanatory and descriptive In ductive Logic Programming (ILP) is presented. The induced hypotheses in this framework are pairs of the form (T, IC) where T is a defi nite clausal theory and IC is a set of integrity constraints. The two components allow us to combine complementary information from the same data by applying both explanat...
This paper examines critically organisations’ focus on resource-based partnering strategies and their attempts to capitalise on shared knowledge for competitive advantage. We argue that the commodification of knowledge rather than information is a key feature of modern collaboration, and its success is subject to the governance mechanisms of trust and power as they act to facilitate or constrai...
Schema validation and view updating are database engineering problems which seem to differ significantly. Hence, for solving them, significantly different approaches are taken, usually. However, one of the contributions of this paper is: We show that any sound method for view updating can effectively be used also for validating schema specifications. We consider typical schema validation tasks ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید