Results 51 to 60 of about 1,801,338 (187)
Moving Target Detection and Tracking Algorithm Based on Context Information
To improve the robustness of target tracking algorithms in a complex environment, this paper proposes the moving target detection and tracking algorithm based on context information and closed-loop learning.
Jing Li, Junzheng Wang, Wenxue Liu
doaj +1 more source
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations [PDF]
Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian ...
Galbraith, Steven D. +2 more
core +1 more source
Thematic Context Derivator Algorithm for Enhanced Context Vector Machine: eCVM
Natural Language Processing uses word embeddings to map words into vectors. Context vector is one of the techniques to map words into vectors. The context vector gives importance of terms in the document corpus. The derivation of context vector is done using various methods such as neural networks, latent semantic analysis, knowledge base methods etc ...
Vaibhav Khatavkar +2 more
openaire +1 more source
Algorithms on grammars/transducers with context-free derivations: hypergraph reachability, shortest path, and inside-outside pruning of 'relatively useless' arcs that are unused by any near-shortest paths.
openaire +2 more sources
RETE-ADH: An Improvement to RETE for Composite Context-Aware Service
We propose a new pattern matching algorithm for composite context-aware services. The new algorithm, RETE-ADH, extends RETE to enhance systems that are based on the composite context-aware service architecture. RETE-ADH increases the speed of matching by
Milhan Kim +6 more
doaj +1 more source
Riemannian Median and Its Estimation
In this paper, we define the geometric median of a probability measure on a Riemannian manifold, give its characterization and a natural condition to ensure its uniqueness.
Yang, Le
core +1 more source
The emergence of software-defined networking (SDN) and network function virtualization (NFV) facilitates policy-driven and dynamic service function chaining (SFC).
Guanglei Li +3 more
doaj +1 more source
Exploiting visual salience for the generation of referring expressions [PDF]
In this paper we present a novel approach to generating referring expressions (GRE) that is tailored to a model of the visual context the user is attending to.
Kelleher, John D., van Genabith, Josef
core
FiEstAS sampling -- a Monte Carlo algorithm for multidimensional numerical integration
This paper describes a new algorithm for Monte Carlo integration, based on the Field Estimator for Arbitrary Spaces (FiEstAS). The algorithm is discussed in detail, and its performance is evaluated in the context of Bayesian analysis, with emphasis on ...
Allanach +11 more
core +1 more source
Research on run-time overhead of RM and improvement
RM algorithm is a classic fixed priority real-time scheduling algorithm, but in most embedded real-time sys- tems, where the workload is composed of many tasks of high frequency and short execution time, the overheads from context-switches of real-time ...
LUO Ding-ding +4 more
doaj +2 more sources

