Learning how to exploit sources of information
نویسندگان
چکیده
منابع مشابه
How to Exploit Local Information When Distilling Entanglement
Distillation protocols enable generation of high quality entanglement even in the presence of noise. Existing protocols ignore the presence of local information in mixed states produced from some noise sources such as photon loss, amplitude damping or thermalization. We propose new protocols that exploit local information in mixed states. Our protocols converge to higher fidelities in fewer rou...
متن کاملHow and why exploit tweet's location information?
Tweets exchanged over the Internet represent an important source of information, even if their characteristics make them difficult to analyze (e.g. a maximum of 140 characters, etc.). In addition associated to every message, lots of information such as location or date, are available. Taking into account these meta-information can be very useful for the decision maker. Obviously, due to the cha...
متن کاملHow to exploit prior information in low-complexity models
Compressed Sensing refers to extracting a lowdimensional structured signal of interest from its incomplete random linear observations. A line of recent work has studied that, with the extra prior information about the signal, one can recover the signal with much fewer observations. For this purpose, the general approach is to solve weighted convex function minimization problem. In such settings...
متن کاملLearning How to Exploit Proximal Force Sensing: a Comparison Approach
We present an evaluation of different techniques for the estimation of forces and torques measured by a single six-axis force/torque sensor placed along the kinematic chain of a humanoid robot arm. In order to retrieve the external forces and detect possible contact situations, the internal forces must be estimated. The prediction performance of an analytically derived dynamic model as well as ...
متن کاملHow to Exploit Ontologies in Trust Negotiation
The World Wide Web makes it easy to share information and resources, but offers few ways to limit the manner in which these resources are shared. The specification and automated enforcement of security-related policies offer promise as a way of providing controlled sharing, but few tools are available to assist in policy specification and management, especially in an open system such as the Web...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Memory & Cognition
سال: 2018
ISSN: 0090-502X,1532-5946
DOI: 10.3758/s13421-018-0881-x