نتایج جستجو برای: assigned value

تعداد نتایج: 819699  

2006
Lijun Qu Xiaoru Yuan Minh X. Nguyen Gary W. Meyer Baoquan Chen Jered E. Windsheimer

In this paper, we present a textured point-based rendering scheme that takes into account the masking properties of the human visual system. In our system high quality textures are mapped to point-based models. Given one texture, an importance map is first computed using the visual masking tool included in the JPEG2000 standard. This importance map indicates the masking potential of the texture...

2002
Zeikc Taylor Karol Miller

This paper explores the significance of the inherent strain rate-dependence of many biological materials. Such characteristics are pertinent to computational modelling of these materials for the purposes of surgical robotics and simulation. A pair of 2-dimensional fmite element models of the human brainlvenmcle system are developed and used to analyse the brain structural disease, hydrocephalus...

2008
Karen Mayor Seán Lyons David Duffy Richard S.J. Tol

We use a hedonic house price model to estimate the value of transport networks to homeowners in the Dublin area. Using a dataset of house sales between 2001 and 2006 and combining it with available geographical information system data on the train and tram lines in Dublin, it is possible to assess the values assigned to different transport links by homeowners. We find that the value of transpor...

Journal: :Bulletin of the Menninger Clinic 2008
Caspar C Berghout Jolien Zevalkink

The present study compared 89 patients assigned to long-term psychoanalytic psychotherapy or psychoanalysis in the Netherlands with psychiatric and nonclinical norm groups with regard to symptoms and personality pathology as assessed with six instruments. Patients filled in four self-report questionnaires (Symptom Checklist-90-Revised [SCL-90-R], Beck Depression Inventory-II [BDI-II], State-Tra...

2005
Guang-Bin Huang

A new learning algorithm called extreme learning machine (ELM) has recently been proposed for single-hidden layer feedforward neural networks (SLFNs) with additive neurons to easily achieve good generalization performance at extremely fast learning speed. ELM randomly chooses the input weights and analytically determines the output weights of SLFNs. It is proved in theory that ELM can be extend...

Journal: :Canadian journal of microbiology 1989
M Thomm G Wich J W Brown G Frey B A Sherf G S Beckler

To identify an archaebacterial promoter sequence, nuclease protection studies with the purified RNA polymerase of Methanococcus vannielii were performed. The enzyme binds specifically both at protein-encoding (hisA and methyl CoM reductase, component C) and tRNA-rRNA genes. The binding region of the RNA polymerase extends from 30 base pairs (bp) upstream (-30) to 20 bp downstream (+20) from the...

Journal: :Cognitive psychology 2001
K Christianson A Hollingworth J F Halliwell F Ferreira

In the literature dealing with the reanalysis of garden path sentences such as While the man hunted the deer ran into the woods, it is generally assumed either that people completely repair their initial incorrect syntactic representations to yield a final interpretation whose syntactic structure is fully consistent with the input string or that the parse fails. In a series of five experiments,...

Journal: :Inf. Process. Manage. 2004
Kazem Taghva Julie Borsack Thomas A. Nartker Allen Condit

We report on two types of experiments with respect to manually-assigned keywords to documents in a collection. The first type of experiment examines the usefulness of manually-assigned keywords to automatic feedback. The second type of experiment considers the potential benefits of these keywords to the user as an interactive tool. Several experiments were run and compared. The results of these...

2010
Xinyuan Wang Xuxian Jiang

Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking the control flow of the infected system or program. Therefore, it is critically important to protect our mission critical systems from malicious control flows. Inspired by the self-nonself discrimination in natural imm...

Journal: :J. Parallel Distrib. Comput. 2015
Julien Herrmann Loris Marchal Yves Robert

We study the complexity of traversing tree-shaped workflows whose tasks require large I/O files. We target a heterogeneous architecture with two resource types, each with a different memory, such as a multicore node equipped with a dedicated accelerator (FPGA or GPU). The tasks in the workflow are colored according to their type and can be processed if all there input and output files can be st...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید