Results 1 - 10
of
115
An I-vector Based Approach to Compact Multi-Granularity Topic Spaces Representation of Textual Documents
"... Various studies highlighted that topic-based approaches give a powerful spo-ken content representation of documents. Nonetheless, these documents may con-tain more than one main theme, and their automatic transcription inevitably contains errors. In this study, we propose an orig-inal and promising ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
framework based on a compact representation of a textual docu-ment, to solve issues related to topic space granularity. Firstly, various topic spaces are estimated with different numbers of classes from a Latent Dirichlet Allocation. Then, this multiple topic space representa-tion is compacted
Title of Document: QUANTUM MECHANICS AND QUANTUM INFORMATION THEORY
"... The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main quest ..."
Abstract
- Add to MetaCart
The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main question with which this dissertation will be concerned is whether or not an information-theoretic interpretation can serve as a conceptually acceptable interpretation of quantum mechanics. It will be argued that some of the more obvious approaches – that quantum information theory shows us that ultimately the world is made of information, and quantum Bayesianism – fail as philosophical interpretations of quantum mechanics. However, the information-theoretic approach of Clifton, Bub, and Halvorson introduces Einstein’s distinction between principle theories and constructive theories, arguing that quantum mechanics is best understood as an information-theoretic principle theory. While I argue that this particular approach fails, it does offer a viable new philosophical role for information theory. Specifically, an investigation of interpretationally successful principle theories such as Newtonian mechanics, special relativity, and general
Efficient Sparse Voxel Octrees
"... Figure 1: Sibenik cathedral ray-traced using voxels. Voxel data was created with high-resolution surface displacement, and ambient occlusion was calculated as a pre-process step. All geometry and shading data is stored on a per-voxel basis, i.e. there are no instantiated objects, textures, or materi ..."
Abstract
-
Cited by 31 (1 self)
- Add to MetaCart
geometric resolution, allows more compact encoding of smooth surfaces, and accelerates ray casts. We also employ a novel normal compression format for storing high-precision object-space normals. Finally, we present a variable-radius post-process filtering technique for smoothing out blockiness caused
An Overview of the Literature Related to Social Representations Published in Scientifi c Journals
"... Abstract The present study aims at characterizing part of the academic production on social representations published in scientifi c journals, so as to provide information about the development and current state of the fi eld. In August and September 2013 2526 abstracts of papers published in journ ..."
Abstract
- Add to MetaCart
meta-analysis. She presented the results of a meta-theoretical analysis based on 2065 bibliographical sources, including 956 book chapters, 936 journal articles, 65 papers presented at conferences, 57 PhD thesis chapters, 46 university reports or manuscripts and 5 web documents, all published from 1952
Automatic program repair with evolutionary computation,”
- Commun. ACM,
, 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract
-
Cited by 34 (5 self)
- Add to MetaCart
al. 24 are: • Algorithms to find and minimize program repairs based on test cases that describe desired functionality. The algorithms are generic in the sense that they can repair many classes of bugs. • A novel and efficient representation and set of operations for applying GP to program repair
Leeuwen, “Source-normalised-and-weighted LDA for robust speaker recognition using i-vectors
- in accepted into IEEE Int. Conf. on Acoustics, Speech and Signal Processing
, 2011
"... The recently developed i-vector framework for speaker recognition has set a new performance standard in the research field. An i-vector is a compact representation of a speaker utterance extracted from a low-dimensional total variability subspace. Prior to classification using a cosine kernel, i-vec ..."
Abstract
-
Cited by 15 (5 self)
- Add to MetaCart
The recently developed i-vector framework for speaker recognition has set a new performance standard in the research field. An i-vector is a compact representation of a speaker utterance extracted from a low-dimensional total variability subspace. Prior to classification using a cosine kernel, i
unknown title
"... Predicting availability to consumers of spatially and temporally variable resources ..."
Abstract
- Add to MetaCart
Predicting availability to consumers of spatially and temporally variable resources
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream
Use of number by fish
, 2009
"... Background: Research on human infants, mammals, birds and fish has demonstrated that rudimentary numerical abilities pre-date the evolution of human language. Yet there is controversy as to whether animals represent numbers mentally or rather base their judgments on non-numerical perceptual variable ..."
Abstract
-
Cited by 9 (3 self)
- Add to MetaCart
variables that co-vary with numerosity. To date, mental representation of number has been convincingly documented only for a few mammals. Methodology/Principal Findings: Here we used a training procedure to investigate whether mosquitofish could learn to discriminate between two and three objects even when
Results 1 - 10
of
115