Results 1 - 10
of
8,337
ON VARIOUS RESTRICTED SUMSETS
- J. NUMBER THEORY 114(2005), NO. 2, 209–220.
, 2005
"... For finite subsets A1,..., An of a field, their sumset is given by {a1 + · · · + an: a1 ∈ A1,..., an ∈ An}. In this paper we study various restricted sumsets of A1,..., An with restrictions of the following forms: ai − aj ̸ ∈ Sij, or αiai ̸ = αjaj, or ai + bi ̸ ≡ aj + bj (mod mij). Furthermore, we ..."
Abstract
-
Cited by 9 (5 self)
- Add to MetaCart
For finite subsets A1,..., An of a field, their sumset is given by {a1 + · · · + an: a1 ∈ A1,..., an ∈ An}. In this paper we study various restricted sumsets of A1,..., An with restrictions of the following forms: ai − aj ̸ ∈ Sij, or αiai ̸ = αjaj, or ai + bi ̸ ≡ aj + bj (mod mij). Furthermore
On combining classifiers
- IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 1998
"... We develop a common theoretical framework for combining classifiers which use distinct pattern representations and show that many existing schemes can be considered as special cases of compound classification where all the pattern representations are used jointly to make a decision. An experimental ..."
Abstract
-
Cited by 1420 (33 self)
- Add to MetaCart
. An experimental comparison of various classifier combination schemes demonstrates that the combination rule developed under the most restrictive assumptions—the sum rule—outperforms other classifier combinations schemes. A sensitivity analysis of the various schemes to estimation errors is carried out to show
Abstract COUNTING PLANAR DIAGRAMS WITH VARIOUS RESTRICTIONS
, 1998
"... Explicit expressions are considered for the generating functions concerning the number of planar diagrams with given numbers of 3- and 4-point vertices. It is observed that planar renormalization theory requires diagrams with restrictions, in the sense that one wishes to omit ‘tadpole ’ inserions an ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and ‘seagull ’ insertions; at a later stage also self-energy insertions are to be removed, and finally also the dressed 3-point inserions and the dressed 4-point insertions. Diagrams with such restrictions can all be counted exactly. This results in various critical lines in the λ-g plane, where λ and g
Behavior-based Formation Control for Multi-robot Teams
- IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION
, 1997
"... New reactive behaviors that implement formations in multi-robot teams are presented and evaluated. The formation behaviors are integrated with other navigational behaviors to enable a robotic team to reach navigational goals, avoid hazards and simultaneously remain in formation. The behaviors are im ..."
Abstract
-
Cited by 663 (4 self)
- Add to MetaCart
are implemented in simulation, on robots in the laboratory and aboard DARPA's HMMWV-based Unmanned Ground Vehicles. The technique has been integrated with the Autonomous Robot Architecture (AuRA) and the UGV Demo II architecture. The results demonstrate the value of various types of formations in autonomous
Dynamic programming algorithm optimization for spoken word recognition
- IEEE TRANSACTIONS ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING
, 1978
"... This paper reports on an optimum dynamic programming (DP) based time-normalization algorithm for spoken word recognition. First, a general principle of time-normalization is given using timewarping function. Then, two time-normalized distance definitions, ded symmetric and asymmetric forms, are der ..."
Abstract
-
Cited by 788 (3 self)
- Add to MetaCart
is restricted so as to improve discrimination between words in different categories. AND SEIBI CHIBA vestigations were made, based on the assumption that speech patterns are time-sampled with a common and uniform sampling period, as in most general cases. One of the problems discussed in this paper involves
Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach
- IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
, 1999
"... Evolutionary algorithms (EA’s) are often well-suited for optimization problems involving several, often conflicting objectives. Since 1985, various evolutionary approaches to multiobjective optimization have been developed that are capable of searching for multiple solutions concurrently in a singl ..."
Abstract
-
Cited by 813 (22 self)
- Add to MetaCart
Evolutionary algorithms (EA’s) are often well-suited for optimization problems involving several, often conflicting objectives. Since 1985, various evolutionary approaches to multiobjective optimization have been developed that are capable of searching for multiple solutions concurrently in a
Shared memory consistency models: A tutorial
- IEEE Computer
, 1996
"... Parallel systems that support the shared memory abstraction are becoming widely accepted in many areas of computing. Writing correct and efficient programs for such systems requires a formal specification of memory semantics, called a memory consistency model. The most intuitive model—sequential con ..."
Abstract
-
Cited by 441 (10 self)
- Add to MetaCart
—sequential consistency—greatly restricts the use of many performance optimizations commonly used by uniprocessor hardware and compiler designers, thereby reducing the benefit of using a multiprocessor. To alleviate this problem, many current multiprocessors support more relaxed consistency models. Unfortunately
The processing-speed theory of adult age differences in cognition
- Psychological Review
, 1996
"... A theory is proposed to account for some of the age-related differences reported in measures of Type A or fluid cognition. The central hypothesis in the theory is that increased age in adulthood is associated with a decrease in the speed with which many processing operations can be executed and that ..."
Abstract
-
Cited by 416 (2 self)
- Add to MetaCart
the products of early processing may no longer be available when later processing is complete (simultaneity). Several types of evidence, such as the discovery of con-siderable shared age-related variance across various measures of speed and large attenuation of the age-related influences on cognitive measures
Security-control methods for statistical databases: a comparative study
- ACM Computing Surveys
, 1989
"... This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation. ..."
Abstract
-
Cited by 416 (0 self)
- Add to MetaCart
This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
. They conclude that swap market-specific supply/demand shocks drive the unexplained changes in swap rates. Existing literature on credit spread changes is limited. 3 Pedrosa and Roll (1998) document considerable co-movement of credit spread changes among index portfolios of bonds from various industry, quality
Results 1 - 10
of
8,337