نتایج جستجو برای: linear dependencies
تعداد نتایج: 505382 فیلتر نتایج به سال:
NLS is a stream cipher consisting of a non-linear feedback shift register (NFSR) and a non-linear filter (NLF). This paper presents a linear distinguishing attack on NLS using an improved version of the Crossword Puzzle (CP) attack [2] by exploiting the internal dependencies between the NFSR and NLF. We derive significantly higher bias linear approximations of the NFSR and NLF using linear comb...
This paper presents a non-projective dependency parsing system that is transition-based and operates in three steps. The three steps include one classical method for projective dependency parsing and two inverse methods predicting separately the right and left non-projective dependencies. Splitting the parsing allows to increase the scores on both projective and non-projective dependencies comp...
Linear and selective undo mechanisms have been studied extensively. However, relatively little attention has been given to the semantics of selective undo in situations in which the undone command has dependency relationships with actions later in the command history. We propose a new approach to selective undo using a process modeling language from the software process community to model depen...
This paper presents and evaluates two linear feature extractors based on mutual information. These feature extractors consider general dependencies between features and class labels, as opposed to statistical techniques such as PCA which does not consider class labels and LDA, which uses only simple rst order dependencies. As evidenced by several simulations on high dimensional data sets, the p...
Background and aim: Today, it was revealed that Socio-technical systems did not have a bimodal nature and interactions in these systems are complex and non-linear. Consequently, since risks can be emerged as non-linear combinations of performance variability, so traditional methods of risk assessment are not able to capture these combinations. The present paper is aimed at identifying the eme...
We study keys and functional dependencies in the context of partial relations that permit null values with the interpretation no information. Based on Codd’s principle of entity integrity we propose the class of strong keys over partial database relations. These keys enforce both uniqueness and totality of tuples. We study the interaction of strong keys with Lien, Atzeni and Morfuni’s classes o...
The assumption that the problem of ambiguity in text analysis can only be solved if statistical dependencies of higher than second order are considered leads us to independent component analysis (ICA), a statistical formalism that takes higher-order dependencies into account. By assuming independence, ICA is capable of detecting a set of hidden vectors if only different linear mixtures of these...
The rapid time variation of mobile radio channels is often modeled as a random process with second order moments reeecting vehicle speed, bandwidth and the scattering environment. These statistics typically show that there is little room for prediction of channel properties such as received power or complex taps of the impulse response coeecients, at least when linear predictor structures are c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید