首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
We give a brief overview of a logic-based symbolic modeling language PRISM which provides a unified approach to generative probabilistic models including Bayesian networks, hidden Markov models and probabilistic context free grammars. We include some experimental result with a probabilistic context free grammar extracted from the Penn Treebank. We also show EM learning of a probabilistic context free graph grammar as an example of exploring a new area.
Taisuke SatoEmail:
  相似文献   

3.
Christos H. Papadimitriou is one of the most influential and colorful researchers in Computer Science today. This glimpse is the outcome of a modest attempt of us to a biographical introduction to Christos, which we have drafted with extreme delight and honor.  相似文献   

4.
This expository paper examines combinatory algebra and the lambda calculus as foundations for functional languages (LISP, FP, KRC, etc.,). The basic notions are defined and numerous examples are given. Historical comments and references are provided.  相似文献   

5.
6.
7.
Below is a factual snapshot of the FBI blunder where virtual information regarding Al Quaeda associates was captured and subsequently destroyed.  相似文献   

8.
Some 35 years ago, Larry Kaufman and Himo Ansara provided the stimulus to bring together a small number of scientists who were working on the calculation of alloy phase diagrams using as basis the required consistency of experimental thermodynamic and phase boundary data. This group represented the origins of CALPHAD and of subsequent developments concerned with computer coupling of phase diagrams and thermochemistry. From those origins, the “CALPHAD Method” has become a successful and widely applied tool in all areas of materials development.  相似文献   

9.
In this section the author gives a very short history of cryptography focusing on the key techniques that were used for encipherment purposes. These include polyalphabetic ciphers and the earliest generations of cipher machines such as Enigma.  相似文献   

10.
11.
12.
In this paper, a brief account of the field of runtime verification is given. Starting with a definition of runtime verification, a comparison to well-known verification techniques like model checking and testing is provided, and applications in which runtime verification brings out its distinguishing features are pointed out. Moreover, extensions of runtime verification such as monitor-oriented programming, and monitor-based runtime reflection are sketched and their similarities and differences are discussed. Finally, the use of runtime verification for contract enforcement is briefly pointed out.  相似文献   

13.
本文是有关网络存储的系列文章中的第一篇。本文简单的介绍了存储、网络存储以及网络存储的几个基本架构,以期使读者对网络存储有一个总的认识和理解。在随后的文章中,将会陆续谈到存储虚拟化、集群存储、备份和恢复以及云存储等内容。  相似文献   

14.
15.
16.
17.
18.
在线社交网络是伴随着互联网技术发展产生的,它属于众多复杂网络中的一种。近年来,对于在线社交网络的研究不断深入,研究方向可以细分为网络拓扑特征的分析、虚拟社区划分算法的研究、传播动力学研究、网络采样与重构、网络拓扑识别等。大数据研究的兴起使得在线社交网络的研究更加受到人们的关注。当前,人们的日常生活几乎离不开在线社交网络,也因此每天都会有大量的用户数据产生,分析、利用这些数据可以帮助人们了解自己并创造更多的价值。  相似文献   

19.
Recent interest in the topic of expert systems has been enormous, and continues to grow. This allegedly new tool has been proposed for implementation in an incredibly diverse array of problems, including a host of problem types that are (or should be) of interest to the operations researcher. In this tutorial, we present a very brief overview of expert systems. In particular, we examine its relationship and usefulness to the operations research profession.  相似文献   

20.
Multimedia Tools and Applications - Multi-task learning (MTL), which optimizes multiple related learning tasks at the same time, has been widely used in various applications, including natural...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号