Results 41 to 50 of about 230,301 (307)

Efficient Human Pose Estimation in Hierarchical Context

open access: yesIEEE Access, 2019
Most existing human pose estimation methods focus on enhancing the accuracy performance alone while ignoring the critical model efficiency issue. This dramatically limits their scalability and deployability in large-scale applications.
Feng Zhang, Xiatian Zhu, Mao Ye
doaj   +1 more source

—Versatile Syntax and Semantics for Functional Harmonic Analysis Labels

open access: yesMusic & Science, 2022
Traditional harmonic analysis annotations can be represented in a computer model of a piece of music by plain text strings. But whenever automated processing like analysis, comparison or retrieval is intended, a formal definition is helpful.
Markus Lepper   +2 more
doaj   +1 more source

Geometric Characteristics of the Wasserstein Metric on SPD(n) and Its Applications on Data Processing

open access: yesEntropy, 2021
The Wasserstein distance, especially among symmetric positive-definite matrices, has broad and deep influences on the development of artificial intelligence (AI) and other branches of computer science.
Yihao Luo   +3 more
doaj   +1 more source

A Cop and Drunken Robber Game on n-Dimensional Infinite-Grid Graphs

open access: yesMathematics, 2021
A Cop and Drunken Robber (CDR) game is one variation of a famous combinatorial game, called Cops and Robbers, which has been extensively studied and applied in the area of theoretical and computer science as demonstrated by several conferences and ...
Nuttanon Songsuwan   +3 more
doaj   +1 more source

A Quicker Iteration Method for Approximating the Fixed Point of Generalized α-Reich-Suzuki Nonexpansive Mappings with Applications

open access: yesFractal and Fractional, 2023
Fixed point theory is a branch of mathematics that studies solutions that remain unchanged under a given transformation or operator, and it has numerous applications in fields such as mathematics, economics, computer science, engineering, and physics. In
Danish Ali   +5 more
doaj   +1 more source

EXTENSION OF CRITICAL PROGRAMS OF THE COMPUTATIONAL THEORY OF MIND [PDF]

open access: yesFilozofia i Nauka, 2022
Technological advances in computer science have secured the computer metaphor status of a heuristic methodological toolused to answer the question about the nature of mind.
Pavel N. Baryshnikov
doaj   +1 more source

Mathematical Logic and Deduction in Computer Science Education

open access: yesInformatics in Education, 2008
Mathematical logic is a discipline used in sciences and humanities with different point of view. Although in tertiary level computer science education it has a solid place, it does not hold also for secondary level education.
Hashim HABIBALLA, Tibor KMET
doaj   +1 more source

CS AKTive space

open access: yesProceedings of the 13th international conference on World Wide Web, 2004
We present a Semantic Web application that we callCS AKTive Space. The application exploits a wide range of semantically heterogeneousand distributed content relating to Computer Science research in theUK. This content is gathered on a continuous basis using a variety of methods including harvesting and scraping as well as adopting a range models for ...
schraefel, m.c.   +4 more
openaire   +4 more sources

Modal logics are coalgebraic [PDF]

open access: yes, 2008
Applications of modal logics are abundant in computer science, and a large number of structurally different modal logics have been successfully employed in a diverse spectrum of application contexts.
Cirstea, Corina   +4 more
core   +5 more sources

Construção da referência e representação lexical: por um tratamento dinâmico da semântica lexical

open access: yesCadernos de Estudos Lingüísticos, 2011
This papers deals with some models of explanation of the lexical semantics offered by recent linguistics and cognitive science. Our aim is to show the inadequacy of the digital computer model when it is confronted to some data.
Maria Luiza Aragão da Cunha Lima
doaj   +1 more source

Home - About - Disclaimer - Privacy