نتایج جستجو برای: pattern dependency

تعداد نتایج: 386844  

2004
B. Kalantari V. Schlott T. Korhonen

One of the features of advanced third generation light sources is the bunch pattern control in the storage ring, where various filling patterns are of interest for different experiments. The most important step is to keep a uniform charge distribution over all (electron) bunches during the top-up operation. Such a bunch pattern control has been implemented at the Swiss Light Source (SLS). It pr...

2007
Anthony J H Simons Monique Snoeck Kitty S Y Hung

This paper shows how Design Patterns may be used to reveal important properties of object-oriented development methods. The responsibility-driven and event-driven design methods are contrasted with a direct encoding of analysis models to show how these methods properly transform and layer systems. Each method elevates a different modularising principle: contract minimisation and existence depen...

2012
Jaume Baixeries Mehdi Kaytoue-Uberall Amedeo Napoli

The treatment of many-valued data with FCA has been achieved by means of scaling. This method has some drawbacks, since the size of the resulting formal contexts depends usually on the number of different values that are present in a table, which can be very large. Pattern structures have been proved to deal with many-valued data, offering a viable and sound alternative to scaling in order to r...

Journal: :Expert Syst. Appl. 2009
Manoel Castro-Neto Youngseon Jeong Myong Kee Jeong Lee D. Han

Traffic volume is a fundamental variable in several transportation engineering applications. For instance, in transportation planning, the annual average daily traffic (AADT) is a primary element that has to be estimated for the year of horizon of the analysis. The huge amounts of money to be invested in designed transportation systems are strongly associated with the traffic volumes expected i...

Journal: :Inf. Comput. 2004
Christian Haack Alan Jeffrey

Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on types for authenticity did not allow for such nested cryptography. In this work, we present the pattern-matching spi-calculus, which is an obvious extension of the spi-calculus to include pattern-matching as primitive. Th...

1998
Anthony J H Simons Monique Snoeck

One of the least systematically explored stages in object-oriented design is the process whereby groups of classes are organised into progressively larger units. The identification and evaluation of subsystems is still largely an intuitive, or expert activity. An effective design process should be capable of layering systems, yielding subsystem units which are cohesive internally and loosely co...

2013

At a time of global warming, growing environmental concerns and a political situation that is making many industrialised countries critically review their dependency on Middle Eastern oil, the need to develop alternatives to fossil fuels is becoming increasingly important. And this is not just a recurring demand from environmentalists; most industrialised countries signed the Kyoto Treaty, comm...

2010
S. Arash Ostadzadeh Roel Meeuws Carlo Galuzzi Koen Bertels

In this paper, we present the Quantitative Usage Analysis of Data (QUAD) tool, a sophisticated memory access tracing tool that provides a comprehensive quantitative analysis of memory access patterns of an application with the primary goal of detecting actual data dependencies at function-level. As improvements in processing performance continue to outpace improvements in memory performance, to...

Journal: :Forests 2023

As one of the world’s largest ecological rehabilitation programs, three-north (Northern China, Northeastern and Northwestern China) shelterbelts program in China were not well evaluated on its effects multiple soil properties. This paper aims to quantify this. Seven hundred twenty soils from paired plots farmlands neighbor sampled six regions Songnen Plain northeastern China. Multivariate analy...

Journal: :journal of ai and data mining 2016
a. pakzad b. minaei bidgoli

dependency parsing is a way of syntactic parsing and a natural language that automatically analyzes the dependency structure of sentences, and the input for each sentence creates a dependency graph. part-of-speech (pos) tagging is a prerequisite for dependency parsing. generally, dependency parsers do the pos tagging task along with dependency parsing in a pipeline mode. unfortunately, in pipel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید