• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 115
Next 10 →

An I-vector Based Approach to Compact Multi-Granularity Topic Spaces Representation of Textual Documents

by Mohamed Morchid, Mohamed Bouallegue, Richard Dufour, Driss Matrouf, Renato De Mori
"... Various studies highlighted that topic-based approaches give a powerful spo-ken content representation of documents. Nonetheless, these documents may con-tain more than one main theme, and their automatic transcription inevitably contains errors. In this study, we propose an orig-inal and promising ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
framework based on a compact representation of a textual docu-ment, to solve issues related to topic space granularity. Firstly, various topic spaces are estimated with different numbers of classes from a Latent Dirichlet Allocation. Then, this multiple topic space representa-tion is compacted

Title of Document: QUANTUM MECHANICS AND QUANTUM INFORMATION THEORY

by unknown authors
"... The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main quest ..."
Abstract - Add to MetaCart
The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main question with which this dissertation will be concerned is whether or not an information-theoretic interpretation can serve as a conceptually acceptable interpretation of quantum mechanics. It will be argued that some of the more obvious approaches – that quantum information theory shows us that ultimately the world is made of information, and quantum Bayesianism – fail as philosophical interpretations of quantum mechanics. However, the information-theoretic approach of Clifton, Bub, and Halvorson introduces Einstein’s distinction between principle theories and constructive theories, arguing that quantum mechanics is best understood as an information-theoretic principle theory. While I argue that this particular approach fails, it does offer a viable new philosophical role for information theory. Specifically, an investigation of interpretationally successful principle theories such as Newtonian mechanics, special relativity, and general

Efficient Sparse Voxel Octrees

by Samuli Laine, Tero Karras
"... Figure 1: Sibenik cathedral ray-traced using voxels. Voxel data was created with high-resolution surface displacement, and ambient occlusion was calculated as a pre-process step. All geometry and shading data is stored on a per-voxel basis, i.e. there are no instantiated objects, textures, or materi ..."
Abstract - Cited by 31 (1 self) - Add to MetaCart
geometric resolution, allows more compact encoding of smooth surfaces, and accelerates ray casts. We also employ a novel normal compression format for storing high-precision object-space normals. Finally, we present a variable-radius post-process filtering technique for smoothing out blockiness caused

An Overview of the Literature Related to Social Representations Published in Scientifi c Journals

by João Wachelke , Fabíola Rodrigues Matos , Gustavo Cerchi , Soares Ferreira , J Wachelke , F R Matos , G C S Ferreira , R R L Costa
"... Abstract The present study aims at characterizing part of the academic production on social representations published in scientifi c journals, so as to provide information about the development and current state of the fi eld. In August and September 2013 2526 abstracts of papers published in journ ..."
Abstract - Add to MetaCart
meta-analysis. She presented the results of a meta-theoretical analysis based on 2065 bibliographical sources, including 956 book chapters, 936 journal articles, 65 papers presented at conferences, 57 PhD thesis chapters, 46 university reports or manuscripts and 5 web documents, all published from 1952

Automatic program repair with evolutionary computation,”

by Stephanie Forrest , Westley Weimer , Stephanie Forrest , Claire Le Goues , Thanhvu Nguyen - Commun. ACM, , 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract - Cited by 34 (5 self) - Add to MetaCart
al. 24 are: • Algorithms to find and minimize program repairs based on test cases that describe desired functionality. The algorithms are generic in the sense that they can repair many classes of bugs. • A novel and efficient representation and set of operations for applying GP to program repair

Leeuwen, “Source-normalised-and-weighted LDA for robust speaker recognition using i-vectors

by Mitchell Mclaren, David Van Leeuwen - in accepted into IEEE Int. Conf. on Acoustics, Speech and Signal Processing , 2011
"... The recently developed i-vector framework for speaker recognition has set a new performance standard in the research field. An i-vector is a compact representation of a speaker utterance extracted from a low-dimensional total variability subspace. Prior to classification using a cosine kernel, i-vec ..."
Abstract - Cited by 15 (5 self) - Add to MetaCart
The recently developed i-vector framework for speaker recognition has set a new performance standard in the research field. An i-vector is a compact representation of a speaker utterance extracted from a low-dimensional total variability subspace. Prior to classification using a cosine kernel, i

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography

unknown title

by Daniel Grünbaum
"... Predicting availability to consumers of spatially and temporally variable resources ..."
Abstract - Add to MetaCart
Predicting availability to consumers of spatially and temporally variable resources

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream

Use of number by fish

by Christian Agrillo, Marco Dadda, Giovanna Serena, Angelo Bisazza , 2009
"... Background: Research on human infants, mammals, birds and fish has demonstrated that rudimentary numerical abilities pre-date the evolution of human language. Yet there is controversy as to whether animals represent numbers mentally or rather base their judgments on non-numerical perceptual variable ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
variables that co-vary with numerosity. To date, mental representation of number has been convincingly documented only for a few mammals. Methodology/Principal Findings: Here we used a training procedure to investigate whether mosquitofish could learn to discriminate between two and three objects even when
Next 10 →
Results 1 - 10 of 115
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University