نتایج جستجو برای: decomposed
تعداد نتایج: 14070 فیلتر نتایج به سال:
Designing large-scale systems frequently involves solving a complex mathematical program that requires, for various reasons, decomposition into a number of smaller systems. Practical studies have proved the effectiveness of multilevel hierarchical methods at early stages of design; these methods divide a large program into multiple levels and multiple systems at each level and the result is kno...
Hayes (1995) makes an extensive study of metrical stress systems, within a unifying typological framework. The typology is based on earlier work by Hayes (1985) and McCarthy & Prince (1986); it is marked by several striking asymmetries between iambic and trochaic languages. Hayes makes the following claims: That all iambic languages are sensitive to syllable weight (quantity); in particular, th...
Autonomous systems in uncertain dynamic environments must reconfigure themselves in response to unanticipated events and goals in real-time. We present an approach to reactive configuration planning based on the principle of decomposition. Reactive plans are susceptible to exponential state space explosion. We address this problem through transition-based decomposition by generating compact dec...
This paper deals with the problem of jointly mining topics, sentiments, and the association between them from online reviews in an unsupervised way. Previous methods often treat a sentiment as a special topic and assume a word is generated from a flat mixture of topics, where the discriminative performance of sentiment analysis is not satisfied. A key reason is that providing rich priors on the...
| This paper elaborates on a new view on software pipelining, called decomposed software pipelining, and introduced The approach is to decou-ple the problem into resource constraints and dependence constraints. Resource constraints management amounts to scheduling an acyclic graph subject to processors constraints , a problem for which an eeciency bound is known, resulting in a bound for loop s...
Today, the digital forensic techniques for digital images are developed with the origin identification and integrity verification functions for security reasons. Methods based on photo-response-non-uniform (PRNU) are widely studied and proved to be effective to serve the forensic purposes. However, due to the interpolation noise, caused by the colour filtering and interpolation function the acc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید