Search results for "computer.software_genre"

showing 10 items of 3858 documents

Inference of Spatiotemporal Processes over Graphs via Kernel Kriged Kalman Filtering

2018

Inference of space-time signals evolving over graphs emerges naturally in a number of network science related applications. A frequently encountered challenge pertains to reconstructing such dynamic processes given their values over a subset of vertices and time instants. The present paper develops a graph-aware kernel-based kriged Kalman filtering approach that leverages the spatio-temporal dynamics to allow for efficient online reconstruction, while also coping with dynamically evolving network topologies. Laplacian kernels are employed to perform kriging over the graph when spatial second-order statistics are unknown, as is often the case. Numerical tests with synthetic and real data ill…

business.industryInference020206 networking & telecommunicationsNetwork science02 engineering and technologyKalman filterNetwork topologyMachine learningcomputer.software_genreGraphKriging0202 electrical engineering electronic engineering information engineeringArtificial intelligenceNumerical testsbusinessAlgorithmLaplace operatorcomputerMathematics
researchProduct

Number transcoding in children: A functional analysis

1994

French-speaking second-grade children from France and Wallonia were asked to write down in the Arabic code, numbers orally presented at six successive one-month-spaced sessions. The evolution of the children's production (patterns of correct responses and errors) is analysed and tentatively interpreted through the model of number and calculation processing developed by McCloskey in adult neuropsychology. In order to evaluate their number production and comprehension mechanisms the children were furthermore submitted to other number processing tasks. It is tentatively concluded that the children's difficulties in the Arabic written task were localized at the level of the production of the Ar…

business.industryInformation processingNeuropsychologyCognitioncomputer.software_genreDevelopmental psychologyTask (project management)ComprehensionDevelopmental NeuroscienceDevelopmental and Educational PsychologyCode (cryptography)Cognitive developmentProduction (computer science)Artificial intelligencebusinessPsychologycomputerNatural language processingBritish Journal of Developmental Psychology
researchProduct

Evidentials and Epistemic Modality

2018

Abstract This chapter deals with the relation between the notional domains of information source and epistemic modality. It surveys various approaches to this relation and the cross-linguistic patterns of the way in which linguistic units (of diverse formats) with evidential or epistemic meanings develop extensions whereby they encroach into each other’s domains. Meaning extensions in either direction can adequately be captured, and confusion between both domains can be avoided, only if in the analysis of the meaning of such units (a) an onomasiological and semasiological perspective and (b) a coded-inferred divide are distinguished. Thus, epistemic extensions often arise as Generalized Con…

business.industryInformation sourceEpistemic modalityArtificial intelligencebusinessPsychologycomputer.software_genrecomputerReliability (statistics)Natural language processing
researchProduct

Dynamic Modeling of the Cyber Security Threat Problem

2009

This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult to collect statistics about BMs for vulnerabilities and their associated transactions, as they are hidden from general view. We conduct a disguised observation of online BM trading sites to identify causal models of the ongoing viability of BMs. Our observation results are expressed as a system dynamic model. We implement simulations to observe the effects of possible actions to disrupt BMs. The results suggest that without interventions the number and size of BMs is likely to increase. A simulation scenario with a policy to halt BM operations re…

business.industryInternet privacyBlack marketBusinessComputer securitycomputer.software_genrecomputerSystem dynamics
researchProduct

Applying logistic regression to relevance feedback in image retrieval systems

2007

This paper deals with the problem of image retrieval from large image databases. A particularly interesting problem is the retrieval of all images which are similar to one in the user's mind, taking into account his/her feedback which is expressed as positive or negative preferences for the images that the system progressively shows during the search. Here we present a novel algorithm for the incorporation of user preferences in an image retrieval system based exclusively on the visual content of the image, which is stored as a vector of low-level features. The algorithm considers the probability of an image belonging to the set of those sought by the user, and models the logit of this prob…

business.industryIterative methodLinear modelRelevance feedbackPattern recognitioncomputer.software_genreImage (mathematics)Set (abstract data type)Artificial IntelligenceSignal ProcessingRelevance (information retrieval)Computer Vision and Pattern RecognitionArtificial intelligenceData miningbusinessCluster analysisImage retrievalcomputerSoftwareMathematicsPattern Recognition
researchProduct

A Conversational Agent Based on a Conceptual Interpretation of a Data Driven Semantic Space

2005

In this work we propose an interpretation of the LSA framework which leads to a data-driven “conceptual” space creation suitable for an “intuitive” conversational agent. The proposed approach allows overcoming the limitations of traditional, rule-based, chat-bots, leading to a more natural dialogue.

business.industryLatent semantic analysisComputer scienceInterpretation (philosophy)Conceptual spaceSpace (commercial competition)computer.software_genreSemanticsExpert systemIntelligent agentKnowledge baseArtificial intelligenceUser interfaceDialog systembusinesscomputerLSA framework e-learning platforms research engines e-commerceNatural language processing
researchProduct

A word prediction methodology for automatic sentence completion

2015

Word prediction generally relies on n-grams occurrence statistics, which may have huge data storage requirements and does not take into account the general meaning of the text. We propose an alternative methodology, based on Latent Semantic Analysis, to address these issues. An asymmetric Word-Word frequency matrix is employed to achieve higher scalability with large training datasets than the classic Word-Document approach. We propose a function for scoring candidate terms for the missing word in a sentence. We show how this function approximates the probability of occurrence of a given candidate word. Experimental results show that the proposed approach outperforms non neural network lang…

business.industryLatent semantic analysisComputer scienceSentence completionComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Statistical semanticsMachine learningcomputer.software_genreSemanticsSemEvalSentence completion testsword space modelLSAScalabilitylanguage modellatent semantic analysisArtificial intelligencebusinesscomputerComputer Science::Formal Languages and Automata TheoryNatural language processingSentenceWord (computer architecture)word predictionProceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015)
researchProduct

A family of kernel anomaly change detectors

2014

This paper introduces the nonlinear extension of the anomaly change detection algorithms in [1] based on the theory of reproducing kernels. The presented methods generalize their linear counterparts, under both the Gaussian and elliptically-contoured assumptions, and produce both improved detection accuracies and reduced false alarm rates. We study the Gaussianity of the data in Hilbert spaces with kernel dependence estimates, provide low-rank kernel versions to cope with the high computational cost of the methods, and give prescriptions about the selection of the kernel functions and their parameters. We illustrate the performance of the introduced kernel methods in both pervasive and anom…

business.industryMachine learningcomputer.software_genreKernel principal component analysisKernel methodKernel embedding of distributionsPolynomial kernelVariable kernel density estimationKernel (statistics)Radial basis function kernelArtificial intelligencebusinesscomputerAlgorithmChange detectionMathematics2014 6th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS)
researchProduct

Validation of a Reinforcement Learning Policy for Dosage Optimization of Erythropoietin

2007

This paper deals with the validation of a Reinforcement Learning (RL) policy for dosage optimization of Erythropoietin (EPO). This policy was obtained using data from patients in a haemodialysis program during the year 2005. The goal of this policy was to maintain patients' Haemoglobin (Hb) level between 11.5 g/dl and 12.5 g/dl. An individual management was needed, as each patient usually presents a different response to the treatment. RL provides an attractive and satisfactory solution, showing that a policy based on RL would be much more successful in achieving the goal of maintaining patients within the desired target of Hb than the policy followed by the hospital so far. In this work, t…

business.industryManagement scienceComputer scienceMachine learningcomputer.software_genreData setWork (electrical)Robustness (computer science)ErythropoietinmedicineReinforcement learningArtificial intelligencebusinesscomputermedicine.drug
researchProduct

Transcarotid approach for TAVI: an optimal alternative to the transfemoral gold standard

2017

business.industryMasters of Cardiothoracic SurgeryGold standard (test)030204 cardiovascular system & hematologycomputer.software_genre03 medical and health sciences0302 clinical medicineMaterials ChemistryMedicineSurgery030212 general & internal medicineData miningCardiology and Cardiovascular Medicinebusinesscomputer
researchProduct