共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Taisuke Sato 《Journal of Intelligent Information Systems》2008,31(2):161-176
We give a brief overview of a logic-based symbolic modeling language PRISM which provides a unified approach to generative
probabilistic models including Bayesian networks, hidden Markov models and probabilistic context free grammars. We include
some experimental result with a probabilistic context free grammar extracted from the Penn Treebank. We also show EM learning
of a probabilistic context free graph grammar as an example of exploring a new area.
相似文献
Taisuke SatoEmail: |
3.
Christos H. Papadimitriou is one of the most influential and colorful researchers in Computer Science today. This glimpse is the outcome of a modest attempt of us to a biographical introduction to Christos, which we have drafted with extreme delight and honor. 相似文献
4.
W. Richard Stark 《International journal of parallel programming》1984,13(3):219-236
This expository paper examines combinatory algebra and the lambda calculus as foundations for functional languages (LISP, FP, KRC, etc.,). The basic notions are defined and numerous examples are given. Historical comments and references are provided. 相似文献
5.
6.
7.
Wayne Madsen 《Computer Fraud & Security》2002,2002(7):4
Below is a factual snapshot of the FBI blunder where virtual information regarding Al Quaeda associates was captured and subsequently destroyed. 相似文献
8.
Some 35 years ago, Larry Kaufman and Himo Ansara provided the stimulus to bring together a small number of scientists who were working on the calculation of alloy phase diagrams using as basis the required consistency of experimental thermodynamic and phase boundary data. This group represented the origins of CALPHAD and of subsequent developments concerned with computer coupling of phase diagrams and thermochemistry. From those origins, the “CALPHAD Method” has become a successful and widely applied tool in all areas of materials development. 相似文献
9.
《Information Security Technical Report》1997,2(2):14-17
In this section the author gives a very short history of cryptography focusing on the key techniques that were used for encipherment purposes. These include polyalphabetic ciphers and the earliest generations of cipher machines such as Enigma. 相似文献
10.
11.
12.
Martin Leucker Christian Schallhart 《The Journal of Logic and Algebraic Programming》2009,78(5):293-303
In this paper, a brief account of the field of runtime verification is given. Starting with a definition of runtime verification, a comparison to well-known verification techniques like model checking and testing is provided, and applications in which runtime verification brings out its distinguishing features are pointed out. Moreover, extensions of runtime verification such as monitor-oriented programming, and monitor-based runtime reflection are sketched and their similarities and differences are discussed. Finally, the use of runtime verification for contract enforcement is briefly pointed out. 相似文献
13.
本文是有关网络存储的系列文章中的第一篇。本文简单的介绍了存储、网络存储以及网络存储的几个基本架构,以期使读者对网络存储有一个总的认识和理解。在随后的文章中,将会陆续谈到存储虚拟化、集群存储、备份和恢复以及云存储等内容。 相似文献
14.
15.
16.
17.
18.
19.
Recent interest in the topic of expert systems has been enormous, and continues to grow. This allegedly new tool has been proposed for implementation in an incredibly diverse array of problems, including a host of problem types that are (or should be) of interest to the operations researcher. In this tutorial, we present a very brief overview of expert systems. In particular, we examine its relationship and usefulness to the operations research profession. 相似文献
20.
Multimedia Tools and Applications - Multi-task learning (MTL), which optimizes multiple related learning tasks at the same time, has been widely used in various applications, including natural... 相似文献