Search results for "Computer Science Application"

showing 10 items of 3998 documents

An algorithm to find all paths between two nodes in a graph

1990

CombinatoricsComputational MathematicsNumerical AnalysisPhysics and Astronomy (miscellaneous)Applied MathematicsModeling and SimulationGraph (abstract data type)Adjacency matrixAlgorithmComputer Science ApplicationsMathematicsJournal of Computational Physics
researchProduct

Two shortest path metrics on well-formed parentheses strings

1996

We present an analysis of two transformations on well-formed parentheses strings. Using a lattice approach, the corresponding least-move distances are computable, the first in linear time and the second in quadratic time.

CombinatoricsLattice (order)Signal ProcessingMetric (mathematics)Shortest path problemTime complexityComputer Science ApplicationsInformation SystemsTheoretical Computer ScienceMathematicsInformation Processing Letters
researchProduct

A Note on a Conjecture of Duval and Sturmian Words

2002

We prove a long standing conjecture of Duval in the special case of Sturmian words. Mathematics Subject Classication. ??????????????. Let U be a nonempty word on a nite alphabet A: A nonempty word B dierent from U is called a border of U if B is both a prex and sux of U: We say U is bordered if U admits a border, otherwise U is said to be unbordered. For example, U = 011001011 is bordered by the factor 011; while 00010001001 is unbordered. An integer 1 k n is a period of a word U = U1 :::U n if and only if for all 1 i n k we have Ui = Ui+k. It is easy to see that k is a period of U if and only if the prex B of U of length n k is a border of U or is empty. Let (U) denote the smallest period …

CombinatoricsMorphismConjectureIntegerGeneral MathematicsSturmian wordAlphabetSoftwareWord (group theory)Computer Science ApplicationsMathematics
researchProduct

Forbidden Factors and Fragment Assembly

2001

In this paper methods and results related to the notion of minimal forbidden words are applied to the fragment assembly problem. The fragment assembly problem can be formulated, in its simplest form, as follows: reconstruct a word w from a given set I of substrings (fragments ) of a word w . We introduce an hypothesis involving the set of fragments I and the maximal length m(w) of the minimal forbidden factors of w . Such hypothesis allows us to reconstruct uniquely the word w from the set I in linear time. We prove also that, if w is a word randomly generated by a memoryless source with identical symbol probabilities, m(w) is logarithmic with respect to the size of w . This result shows th…

CombinatoricsSet (abstract data type)Fragment (logic)LogarithmDeterministic automatonSymbol (programming)General MathematicsTime complexitySoftwareWord (computer architecture)SubstringComputer Science ApplicationsMathematicsRAIRO - Theoretical Informatics and Applications
researchProduct

XPL the Extensible Presentation Language

2009

The last decade has witnessed a growing interest in the development of web interfaces enabling both multiple ways to access contents and, at the same time, fruition by multiple modalities of interaction (point-and-click, contents reading, voice commands, gestures, etc.). In this paper we describe a framework aimed at streamlining the design process of multi-channel, multimodal interfaces enabling full reuse of software components. This framework is called the eXtensible Presentation architecture and Language (XPL), a presentation language based on design pattern paradigm that keeps separated the presentation layer from the underlying programming logic. The language supplies a methodology to…

Communication designMultimediaComputer Networks and CommunicationsInterface (Java)Computer scienceDesign patternmedia_common.quotation_subjectTK5101-6720computer.software_genreComputer Science ApplicationsPresentationPresentation layerHuman–computer interactionSoftware design patternComponent-based software engineeringTelecommunicationDesign patterns verbal interaction presentation languages data access multimodal interfaces for mobile systemscomputerLogic programmingmedia_commonMobile Information Systems
researchProduct

Reader Comments Agentive Power in COVID-19 Digital News Articles: Challenging Parascientific Information?

2022

The recent COVID-19 pandemic has triggered an enormous stream of information. Parascientific digital communication has pursued different avenues, from mainstream media news to social networking, at times combined. Likewise, citizens have developed new discourse practices, with readers as active participants who claim authority. Based on a corpus of 500 reader comments from The Guardian, we analyse how readers build their authorial voice on COVID-19 news as well as their agentive power and its implications. Methodologically, we draw upon stance markers, depersonalisation strategies, and heteroglossic markers, from the perspective of discursive interpersonality. Our findings unearth that stan…

CommunicationMedia TechnologyAnàlisi del discursBusiness and International ManagementLibrary and Information Sciencesdigital news articles; reader comments; citizens’ agentive power; parascientific genres; pseudoscience; COVID-19 informationComputer Science ApplicationsPublications
researchProduct

Incremental Generalized Discriminative Common Vectors for Image Classification.

2015

Subspace-based methods have become popular due to their ability to appropriately represent complex data in such a way that both dimensionality is reduced and discriminativeness is enhanced. Several recent works have concentrated on the discriminative common vector (DCV) method and other closely related algorithms also based on the concept of null space. In this paper, we present a generalized incremental formulation of the DCV methods, which allows the update of a given model by considering the addition of new examples even from unseen classes. Having efficient incremental formulations of well-behaved batch algorithms allows us to conveniently adapt previously trained classifiers without th…

Complex data typeContextual image classificationComputer Networks and Communicationsbusiness.industryPattern recognitionMachine learningcomputer.software_genreComputer Science ApplicationsDiscriminative modelArtificial IntelligencePrincipal component analysisArtificial intelligencebusinesscomputerSoftwareSubspace topologyCurse of dimensionalityMathematicsIEEE transactions on neural networks and learning systems
researchProduct

Exploring parallel capabilities of an innovative numerical method for recovering image velocity vectors field

2010

In this paper an efficient method devoted to estimate the velocity vectors field is investigated. The method is based on a quasi-interpolant operator and involves a large amount of computation. The operations characterizing the computational scheme are ideal for parallel processing because they are local, regular and repetitive. Therefore, the spatial parallelism of the process is studied to rapidly proceed in the computation on distributed multiprocessor systems. The process has shown to be synchronous, with good task balancing and requiring a small amount of data transfer.

ComputationNumerical analysisProcess (computing)MultiprocessingField (computer science)Computational scienceComputer Science ApplicationsSettore MAT/08 - Analisi NumericaOperator (computer programming)Parallel processing (DSP implementation)Modeling and SimulationModelling and SimulationImage velocity vectors field Quasi-interpolant operator B-spline functions Distributed multiprocessor systemsAlgorithmMathematicsData transmissionMathematical and Computer Modelling
researchProduct

Local Total Variation Bounded Methods for Hyperbolic Conservation Laws

2003

Computational MathematicsConservation lawVariation (linguistics)Bounded functionMathematical analysisGeneral EngineeringComputer Science ApplicationsMathematicsJournal of Computational Methods in Sciences and Engineering
researchProduct

Special issue on geometric constraints and reasoning

2012

Computational MathematicsControl and OptimizationComputational Theory and MathematicsGeometry and TopologyData scienceComputer Science ApplicationsMathematicsComputational Geometry
researchProduct