نتایج جستجو برای: log length split

تعداد نتایج: 428293  

Journal: :IEEE Transactions on Acoustics, Speech, and Signal Processing 1989

2003
Sarah Borys

This paper tests speech recognition using prosody dependent allophone models. The log likehoods of various prosodically labeled phonemes are calculated using Baum-Welsh re-estimation. These log likehoods are then compared to log likehoods of non-prosodically labeled phonemes. Based on the comparison of these log likehoods, it can be concluded that modeling all prosodic information directly in t...

2003
Sarah Borys Mark Hasegawa-Johnson Jennifer Cole

This paper tests speech recognition using prosody dependent allophone models. The log likehoods of various prosodically labeled phonemes are calculated using Baum-Welsh re-estimation. These log likehoods are then compared to log likehoods of non-prosodically labeled phonemes. Based on the comparison of these log likehoods, it can be concluded that modeling all prosodic information directly in t...

2012
John L Moran Patricia J Solomon

BACKGROUND For the analysis of length-of-stay (LOS) data, which is characteristically right-skewed, a number of statistical estimators have been proposed as alternatives to the traditional ordinary least squares (OLS) regression with log dependent variable. METHODS Using a cohort of patients identified in the Australian and New Zealand Intensive Care Society Adult Patient Database, 2008-2009,...

2018
Pawel Gawrychowski Adam Karczmarz Tomasz Kociumaka Jakub Lacki Piotr Sankowski

In this paper we study the fundamental problem of maintaining a dynamic collection of strings under the following operations: • concat – concatenates two strings, • split – splits a string into two at a given position, • compare – finds the lexicographical order (less, equal, greater) between two strings, • LCP – calculates the longest common prefix of two strings. We present an efficient data ...

2010
Majid Khabbazian Dariusz Kowalski Fabian Kuhn Nancy Lynch

We analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. Our algorithms are split formally into two pieces: a high-level piece for broadcast and a low-level piece for contention management. We accomplish the split using abstract versions of the MAC layer to encapsulate t...

Journal: :IACR Cryptology ePrint Archive 2014
Divesh Aggarwal

In this work, we describe a simple and efficient construction of a large subset S of Fp , where p is a prime, such that the set A(S) for any non-identity affine map A over Fp has small intersection with S . Such sets, called affine-evasive sets, were defined and constructed in [ADL14] as the central step in the construction of non-malleable codes against affine tampering over Fp , for a prime p...

2013
Alexander Coward

Distinguishing Physical and Mathematical Knots and Links Joel Hass (joint work with Alexander Coward ) The theory of knots and links studies one-dimensional submanifolds of R. These are often described as loops of string, or rope, with their ends glued together. Real ropes however are not one-dimensional, but have a positive thickness and a finite length. Indeed, most physical applications of k...

Journal: :Forests 2021

The standing skyline continues to be a common cable logging configuration. In payload analysis it is usually assumed that the tagline (line connecting logs carriage) length held constant while yarding turn up corridor. We show this assumption severely limits load-carrying capacity for skylines operating with partial suspension. suggest smart carriage technology could markedly increase log load ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید