共查询到20条相似文献,搜索用时 15 毫秒
1.
4.
With the increasing impact of software systems on everyone’s daily work and life,it is becoming increasingly important that software engineers produce software systems with high confidence.In the past decade,many efforts have been devoted in research on technologies to achieve higher confidence in soft- 相似文献
5.
6.
We study the merging process when Kruskal’s algorithm is run with random graphs as inputs. Our aim is to analyze this process
when the underlying graph is the complete graph on n vertices lying in [0,1]
d
, and edge set weighted with the Euclidean distance. The height of the binary tree explaining the merging process is proved
to be Θ(n) on average. On the way to the proof, we obtain similar results for the complete graph and the d-dimensional square lattice with i.i.d. edge weights. 相似文献
7.
《Journal of Symbolic Computation》2004,37(4):449-453
In 1834 Jacobi gave a method for approximating dominant roots of a polynomial. In 2002 Mignotte and Stefanescu showed that Jacobi’s method works only when the dominant roots are simple. In this note, we show that Jacobi’s method can still be useful even when the dominant roots are not simple, if we use it for approximating the “distinct” dominant roots. 相似文献
8.
《计算机光盘软件与应用》2006,(6):94-95
从旧金山的金矿到伦敦的哈克逊广场(Hoxton Square),Levi’s品牌都是一流的。现在看看Graeme Aymer是如何解析这一品牌的发展过程的.[编者按] 相似文献
9.
Giorgio Magri 《Journal of Logic, Language and Information》2013,22(2):231-247
Boersma’s (1997, 1998) Gradual Learning Algorithm (GLA) performs a sequence of slight re-rankings of the constraint set triggered by mistakes on the incoming stream of data. Data consist of underlying forms paired with the corresponding winner forms. At each iteration, the algorithm needs to complete the current data pair with a corresponding loser form. Tesar and Smolensky (Linguist Inq 29:229–268, 1998) suggest that this current loser should be set equal to the winner predicted by the current ranking. This paper develops a new argument for Tesar and Smolensky’s proposal, based on the GLA’s factorizability. The underlying typology often encodes non-interacting phonological processes, so that it factorizes into smaller typologies that encode a single process each. The GLA should be able to take advantage of this factorizability, in the sense that a run of the algorithm on the original typology should factorize into independent runs on the factor typologies. Factorizability of the GLA is guaranteed provided the current loser is set equal to the current prediction, providing new support for Tesar and Smolensky’s proposal. 相似文献
10.
11.
Christopher Glass 《Nexus Network Journal》2008,10(1):129-148
Ideas similar to Leonardo’s for lattice structures can found many later practical applications (Buckminster Fuller’s domes,
the Zome geometry of Steve Baer from the Whole Earth days, the Tensegrity structures based on the sculpture of Kenneth Snelson,
as well as the Catalan vaulting traditions of Gaudi and the Guastavinos. 相似文献
12.
HuanSheng NING JianHua MA Laurence T.YANG WeiFeng L XinDong WU Victor C.M.LEUNG Vincenzo PIURI 《中国科学:信息科学(英文版)》2014,57(3):1-1
正Along with the flourishing development of information science,the Internet has realized the interconnections among the ubiquitous entities in the cyber space.It brings the unceasing expansion of the interactive data,information,knowledge,and services.The frontier information science is expected to imitate the heuristic intelligence,including human cognition(e.g.attention,emotion,and wisdom)and natural attributes(e.g.,dynamics,and self-adaptability),to promote the evolution of the information techniques.Accordingly,Cybermatics(i.e.,cyberscienceand technology)emerges as an interdisciplinary involving three main aspects:the Internet of Things(IoT),cyber,physical and social computing,and green computing and communications. 相似文献
13.
14.
15.
正Because modern communication networks are expected to deliver increasingly high data rates at a decreasing cost per bit,the spectral efficiency of communication systems must be further improved to facilitate emerging ubiquitous services.Furthermore,because future communication networks will comprise a large 相似文献
16.
ShiMin Hu 《中国科学F辑(英文版)》2009,52(2):161
The rapid progress in information technology has provided huge opportunities to fully utilize all kinds of information resource.Materials,energy,and information are the three indispensable 相似文献
17.
An algorithm for directly obtaining the canonical state-space model corresponding to the Cauer third form of continued fraction expansion (CFE) from a given general state-space model is presented. The algorithm can be used to determine the transfer function of linear time-invariant system from its state-space model as well as to obtain the reduced order models..Two new similarity matrices, one transforms a state-space equation from a general form to a Cauer third CFE canonical form, and the other transforms a state-space model in phase-variable form to a state-space model in a Cauer third CFE canonical form, are derived. Using these matrices an approximate relationship between the original state vector and the state-vector of reduced model obtained by the method of Cauer third CFE is established 相似文献
18.
19.
20.
《计算机科学技术学报》2000,15(3)
SincethejobasamemberoftheEditorialbordtakestimeandeffOrt,fOllowingageneralrule,membersoftheEditorlalbordofthisjournalserveontheboardfortwo-yeartermsofatmosttwoterms.ItismypleasuretointroduceProfessorsWeiZhao,JieWu,Sy-YenKuo,whojoinourEditorialfoardeffectivelyfromMay2000.Theirbiographicalsketcheslisttheirareasofexpertiseandinterests.Theywillhavebigshocstofill,butthesenewmemberswillbemorethanuptothetask.Ifeelfortunatetohavetheprivilegeofworkingwiththem.MINYinghua,ExecutiveEditor-in-Chie… 相似文献