Search results for "ECTN"
showing 10 items of 76 documents
Space partitioning of exchange-correlation functionals with the projector augmented-wave method
2018
We implement a Becke fuzzy cells type space partitioning scheme for the purposes of exchange-correlation within the GPAW projector augmented-wave method based density functional theory code. Space partitioning is needed in the situation where one needs to treat different parts of a combined system with different exchange-correlation functionals. For example, bulk and surface regions of a system could be treated with functionals that are specifically designed to capture the distinct physics of those regions. Here, we use the space partitioning scheme to implement the quasi-nonuniform exchange-correlation scheme, which is a useful practical approach for calculating metallic alloys on the gene…
Automatic Dictionary Creation by Sub-symbolic Encoding of Words
2006
This paper describes a technique for automatic creation of dictionaries using sub-symbolic representation of words in cross-language context. Semantic relationship among words of two languages is extracted from aligned bilingual text corpora. This feature is obtained applying the Latent Semantic Analysis technique to the matrices representing terms co-occurrences in aligned text fragments. The technique allows to find the “best translation” according to a properly defined geometric distance in an automatically created semantic space. Experiments show an interesting correctness of 95% obtained in the best case.
How much geometry it takes to reconstruct a 2-manifold in R 3
2009
Known algorithms for reconstructing a 2-manifold from a point sample in R 3 are naturally based on decisions/predicates that take the geometry of the point sample into account. Facing the always present problem of round-off errors that easily compromise the exactness of those predicate decisions, an exact and robust implementation of these algorithms is far from being trivial and typically requires employment of advanced datatypes for exact arithmetic, as provided by libraries like CORE, LEDA, or GMP. In this article, we present a new reconstruction algorithm, one whose main novelties is to throw away geometry information early on in the reconstruction process and to mainly operate combina…
ENFORCEMENT OF INTER-TASK DEPENDENCIES IN WORKFLOWS, CHARACTERIZATION AND PARADIGM
1998
Workflow techniques have gained a lot of attention as a means to support advanced business applications such as cooperative information systems and process re-engineering but also as a means to integrate legacy systems. Inter-task dependencies, described separately from the other parts of the workflow, have been recognized as a valuable method in describing certain restrictions on the executions of workflows. In this paper, we study the issue of pre-analysing and enforcing inter-task dependencies. The protocol and the theory behind it are presented, along with examples and discussions on ways to improve the performance. The idea is to present the meaning of a dependency through an automato…
Learning Automaton Based On-Line Discovery and Tracking of Spatio-temporal Event Patterns
2010
Published version of an article from the book: Lecture Notes in Computer Science, 2010, Volume 6230/2010, 327-338. The original publication is available at Springerlink. http://dx.doi.org/10.1007/978-3-642-15246-7_31 Discovering and tracking of spatio-temporal patterns in noisy sequences of events is a difficult task that has become increasingly pertinent due to recent advances in ubiquitous computing, such as community-based social networking applications. The core activities for applications of this class include the sharing and notification of events, and the importance and usefulness of these functionalites increases as event-sharing expands into larger areas of one’s life. Ironically, …
Supporting Impact Analysis by Program Dependence Graph Based Forward Slicing
2007
Since software must evolve to meet the typically changing requirements, source code modifications can not be avoided. Impact analysis is one of the central and relatively demanding tasks of software maintenance. It is constantly needed while aiming at ensuring the correctness of the made modifications. Due to its importance and challenging nature automated support techniques are required. Theoretically, forward slicing is a very suitable technique for that purpose. Therefore, we have implemented a program dependence graph (PDG) based tool, called GRACE, for it. For example, due to the typical rewritings of Visual Basic programs there is a great need to support their impact analysis. However…
Reliable numerical solution of a class of nonlinear elliptic problems generated by the Poisson-Boltzmann equation
2020
We consider a class of nonlinear elliptic problems associated with models in biophysics, which are described by the Poisson-Boltzmann equation (PBE). We prove mathematical correctness of the problem, study a suitable class of approximations, and deduce guaranteed and fully computable bounds of approximation errors. The latter goal is achieved by means of the approach suggested in [S. Repin, A posteriori error estimation for variational problems with uniformly convex functionals. Math. Comp., 69:481-500, 2000] for convex variational problems. Moreover, we establish the error identity, which defines the error measure natural for the considered class of problems and show that it yields computa…
Col : A Data Collection Protocol for Vanet
2012
International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…
A Practical Joke in Public Sphere – a Polish Case Study
2017
The aim of the paper is to show multiple layers of discourse and the consequences of a particular practical joke that has been played at a local public event and has become a theme for media coverage nationwide. Students in one of Polish high schools brought a goat as a present to their headmaster and handed it in during their commencement ceremony. Some event participants reported it to the Animal Welfare Society claiming that the goat was mistreated. It seemed that it was not eager to be led on a leash and it urinated, which was interpreted as a sign of discomfort and stress. The story became a headline first in the local and then in the national press and television, and was accompanied …
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…
2018
This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…