نتایج جستجو برای: identifying code
تعداد نتایج: 330700 فیلتر نتایج به سال:
Automating the process of Named Entity Recognition has received a lot of attention over past few years in Social Media Text. Named Entities are real world objects such as Person, Organization, Product, Location. Identifying these entities in social media text is an important challenging task due the informal nature of text present on social media. One such challenge that is faced in recognizing...
In this paper, we consider identifying codes in binary Hamming spaces F, i.e., in binary hypercubes. The concept of identifying codes was introduced by Karpovsky, Chakrabarty and Levitin in 1998. Currently, the subject forms a topic of its own with several possible applications, for example, to sensor networks. Let C ⊆ F. For any X ⊆ F, denote by Ir(X) = Ir(C;X) the set of elements of C within ...
Assume that G = (V ,E) is an undirected graph, and C ⊆ V . For every v ∈ V , denote Ir(G; v) = {u ∈ C : d(u, v) ≤ r}, where d(u, v) denotes the number of edges on any shortest path from u to v in G. If all the sets Ir(G; v) for v ∈ V are pairwise different, and none of them is the empty set, the codeC is called r-identifying. Themotivation for identifying codes comes, for instance, from finding...
Let G be a simple, undirected, connected graph with vertex set V (G) and C ⊆ V (G) be a set of vertices whose elements are called codewords. For v ∈ V (G) and r ≥ 1, let us denote by I r (v) the set of codewords c ∈ C such that d(v, c) ≤ r, where the distance d(v, c) is defined as the length of a shortest path between v and c. More generally, for A ⊆ V (G), we define I r (A) = ∪v∈AI C r (v), wh...
The objective of this study is to establish a method to identify patients with primary immune thrombocytopenia (ITP) utilizing administrative data from diverse data sources that would be appropriate for epidemiologic studies of ITP, regardless of patients' age and source of health care. Medical records of the Oklahoma University Medical Center, 1995-2004, were reviewed to document the accuracy ...
Accelerators like Graphics Processing Units (GPUs) or coprocessors like Intel’s MIC (Many Integrated Core) provide means to exploit large-scale SIMT/SIMD parallelism in applications. Tools for converting CPU code to code for accelerators/coprocessors are available. Application developers could quickly exploit these accelerators/coprocessors with modest effort if they could identify the code seg...
In the software development field, the amount of data related to documentation and to the source code itself is huge. Relevant knowledge can be extracted from these data, provided that the adequate tools are in place. In this context, data mining can be seen as an important tool. This paper presents a new approach for code completion based on sequential patterns mined from previous developed so...
A new package has been developed to provide classes for identifying and analyzing muons in simulated LCD events using Java Analysis Studio. The classes in the package are described. Sample code for performing a JAS LCD muon analysis is presented.
We present MONITORMETHOD, a tool which helps Java programmers gain insight in the behavior of their applications. MONITORMETHOD instruments the Java application and relates hardware performance monitors (HPMs) to the methods in the Java application’s source code. We present a detailed case study showing that linking microprocessorlevel performance characteristics to the source code is helpful f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید