Results for 'Computational Methods'

976 found
Order:
  1. Computational Methods to Extract Meaning From Text and Advance Theories of Human Cognition.Danielle S. McNamara - 2011 - Topics in Cognitive Science 3 (1):3-17.
    Over the past two decades, researchers have made great advances in the area of computational methods for extracting meaning from text. This research has to a large extent been spurred by the development of latent semantic analysis (LSA), a method for extracting and representing the meaning of words using statistical computations applied to large corpora of text. Since the advent of LSA, researchers have developed and tested alternative statistical methods designed to detect and analyze meaning in text (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  2.  47
    Not All Computational Methods Are Effective Methods.Mark Sprevak - 2022 - Philosophies 7 (5):113.
    An effective method is a computational method that might, in principle, be executed by a human. In this paper, I argue that there are methods for computing that are not effective methods. The examples I consider are taken primarily from quantum computing, but these are only meant to be illustrative of a much wider class. Quantum inference and quantum parallelism involve steps that might be implemented in multiple physical systems, but cannot be implemented, or at least not (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3. Hybrid Computational Methods and New Algorithmic Approaches to Computational Kernels and Applications-A Generic Framework for Local Search: Application to the Sudoku Problem.T. Lambert, E. Monfroy & F. Saubion - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 3991--641.
     
    Export citation  
     
    Bookmark  
  4.  27
    Computational Methods for Discoveries from Integrated Data-Human-Interactive Annealing for Multilateral Observation.Yoshiharu Maeno, Kenichi Horie & Yukio Ohsawa - 2008 - In S. Iwata, Y. Oshawa, S. Tsumoto, N. Zhong, Y. Shi & L. Magnani, Communications and Discoveries From Multidisciplinary Data. Springer. pp. 187--203.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  35
    Hybrid computational methods for hyperspectral image analysis.Miguel A. Veganzones & Manuel Graña - 2012 - In Emilio Corchado, Vaclav Snasel, Ajith Abraham, Michał Woźniak, Manuel Grana & Sung-Bae Cho, Hybrid Artificial Intelligent Systems. Springer. pp. 424--435.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  33
    Computational Methods for Identification and Modelling of Complex Biological Systems.Alejandro F. Villaverde, Carlo Cosentino, Attila Gábor & Gábor Szederkényi - 2019 - Complexity 2019:1-3.
    Observability is a modelling property that describes the possibility of inferring the internal state of a system from observations of its output. A related property, structural identifiability, refers to the theoretical possibility of determining the parameter values from the output. In fact, structural identifiability becomes a particular case of observability if the parameters are considered as constant state variables. It is possible to simultaneously analyse the observability and structural identifiability of a model using the conceptual tools of differential geometry. Many (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  8
    Rough computational methods for information systems.J. W. Guan & D. A. Bell - 1998 - Artificial Intelligence 105 (1-2):77-103.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  25
    Bayesian Computation Methods for Inference in Stochastic Kinetic Models.Eugenia Koblents, Inés P. Mariño & Joaquín Míguez - 2019 - Complexity 2019:1-15.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Extending Ourselves: Computational Science, Empiricism, and Scientific Method.Paul Humphreys - 2004 - New York, US: Oxford University Press.
    Computational methods such as computer simulations, Monte Carlo methods, and agent-based modeling have become the dominant techniques in many areas of science. Extending Ourselves contains the first systematic philosophical account of these new methods, and how they require a different approach to scientific method. Paul Humphreys draws a parallel between the ways in which such computational methods have enhanced our abilities to mathematically model the world, and the more familiar ways in which scientific instruments (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   340 citations  
  10. Multi-level computational methods for interdisciplinary research in the HathiTrust Digital Library.Jaimie Murdock, Colin Allen, Katy Börner, Robert Light, Simon McAlister, Andrew Ravenscroft, Robert Rose, Doori Rose, Jun Otsuka, David Bourget, John Lawrence & Chris Reed - 2017 - PLoS ONE 12 (9).
    We show how faceted search using a combination of traditional classification systems and mixed-membership topic models can go beyond keyword search to inform resource discovery, hypothesis formulation, and argument extraction for interdisciplinary research. Our test domain is the history and philosophy of scientific work on animal mind and cognition. The methods can be generalized to other research areas and ultimately support a system for semi-automatic identification of argument structures. We provide a case study for the application of the (...) to the problem of identifying and extracting arguments about anthropomorphism during a critical period in the development of comparative psychology. We show how a combination of classification systems and mixed-membership models trained over large digital libraries can inform resource discovery in this domain. Through a novel approach of “drill-down” topic modeling—simultaneously reducing both the size of the corpus and the unit of analysis—we are able to reduce a large collection of fulltext volumes to a much smaller set of pages within six focal volumes containing arguments of interest to historians and philosophers of comparative psychology. The volumes identified in this way did not appear among the first ten results of the keyword search in the HathiTrust digital library and the pages bear the kind of “close reading” needed to generate original interpretations that is the heart of scholarly work in the humanities. Zooming back out, we provide a way to place the books onto a map of science originally constructed from very different data and for different purposes. The multilevel approach advances understanding of the intellectual and societal contexts in which writings are interpreted. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  19
    Newton's early computational method for dynamics.Michael Nauenberg - 1994 - Archive for History of Exact Sciences 46 (3):221-252.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  12.  24
    The History of Science and the Science of History: Computational Methods, Algorithms, and the Future of the Field.Abraham Gibson & Cindy Ermus - 2019 - Isis 110 (3):555-566.
    Many researchers insist that computational methods will transform the historical profession, while an equally large number reject these claims as unwarranted hype. This study attempts to place the debate in historical and social context. The essay is divided into three parts. The first part offers a brief review of computational history. It asks whether the “computational turn” bears any resemblance to quantitative history and how it fits within the digital humanities. The second part describes the authors’ (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Authorship Attribution: Statistical and Computational Methods'.Joseph Rudman - 2005 - In Keith Brown, Encyclopedia of Language and Linguistics. Elsevier.
    No categories
     
    Export citation  
     
    Bookmark  
  14.  24
    Untranslated Parts of Genes Interpreted: Making Heads or Tails of High-Throughput Transcriptomic Data via Computational Methods.Krzysztof J. Szkop & Irene Nobeli - 2017 - Bioessays 39 (12):1700090.
    In this review we highlight the importance of defining the untranslated parts of transcripts, and present a number of computational approaches for the discovery and quantification of alternative transcription start and poly-adenylation events in high-throughput transcriptomic data. The fate of eukaryotic transcripts is closely linked to their untranslated regions, which are determined by the position at which transcription starts and ends at a genomic locus. Although the extent of alternative transcription starts and alternative poly-adenylation sites has been revealed by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  37
    Robert S. Ledley. Mathematical foundations and computational methods for a digital logic machine. Journal of the Operations Research Society of America, vol. 2 , pp. 249–274. [REVIEW]Raymond J. Nelson - 1955 - Journal of Symbolic Logic 20 (2):195-197.
  16. The computational philosophy: simulation as a core philosophical method.Conor Mayo-Wilson & Kevin J. S. Zollman - 2021 - Synthese 199 (1-2):3647-3673.
    Modeling and computer simulations, we claim, should be considered core philosophical methods. More precisely, we will defend two theses. First, philosophers should use simulations for many of the same reasons we currently use thought experiments. In fact, simulations are superior to thought experiments in achieving some philosophical goals. Second, devising and coding computational models instill good philosophical habits of mind. Throughout the paper, we respond to the often implicit objection that computer modeling is “not philosophical.”.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  17.  31
    Introduction to special issue on computational methods for enforcing privacy and fairness in the knowledge society.Sergio Mascetti, Annarita Ricci & Salvatore Ruggieri - 2014 - Artificial Intelligence and Law 22 (2):109-111.
  18.  14
    Editorial: Parsing Psychology: Statistical and Computational Methods Using Physiological, Behavioral, Social, and Cognitive Data.Jason C. Immekus & Pietro Cipresso - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19. The philosophical novelty of computer simulation methods.Paul Humphreys - 2009 - Synthese 169 (3):615 - 626.
    Reasons are given to justify the claim that computer simulations and computational science constitute a distinctively new set of scientific methods and that these methods introduce new issues in the philosophy of science. These issues are both epistemological and methodological in kind.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   180 citations  
  20. Developing methods to understand discourse and workspace in distributed computer-mediated interaction.Renate Fruchter & Humberto E. Cavallin - 2006 - AI and Society 20 (2):169-188.
    This paper presents ongoing research towards understanding the discourse and workspace in computer-mediated interactions. We present a series of methods developed to study non-collocated computer-mediated interactions. These methods were developed originally to study interactions involving teams composed of architecture, engineering, and construction management students as part of the AEC Global Teamwork course offered at Stanford University in collaboration with universities worldwide since 1993. The methods stress the value of using ethnographic approaches, particularly the role that both discourse (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  20
    (1 other version)Heuristic Methods for Computer Ethics.Walter Maner - 2002 - Metaphilosophy 33 (3):339-365.
    The domain of “procedural ethics” is the set of reflective and deliberative methods that maximize the reliability of moral judgment. While no general algorithmic method exists that will guarantee the validity of ethical deliberation, non‐algorithmic “heuristic” methods can guide and inform the process, making it significantly more robust and dependable. This essay examines various representative heuristic procedures commonly recommended for use in applied ethics, maps them into a uniform set of twelve stages, identifies common faults, then shows how (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  99
    A method for the computational modelling of dialectical argument with dialogue games.T. J. M. Bench-Capon, T. Geldard & P. H. Leng - 2000 - Artificial Intelligence and Law 8 (2-3):233-254.
    In this paper we describe a method for the specification of computationalmodels of argument using dialogue games. The method, which consists ofsupplying a set of semantic definitions for the performatives making upthe game, together with a state transition diagram, is described in full.Its use is illustrated by some examples of varying complexity, includingtwo complete specifications of particular dialogue games, Mackenzie's DC,and the authors' own TDG. The latter is also illustrated by a fully workedexample illustrating all the features of the game.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  23.  13
    Computational text analysis: Thoughts on the contingencies of an evolving method.Daniel Marciniak - 2016 - Big Data and Society 3 (2).
    Mapping a public discourse with the tools of computational text analysis comes with many contingencies in the areas of corpus curation, data processing and analysis, and visualisation. However, the complexity of algorithmic assemblies and the beauty of resulting images give the impression of ‘objectivity’. Instead of concealing uncertainties and artefacts in order to tell a coherent and all-encompassing story, retaining the variety of alternative assemblies may actually strengthen the method. By utilising the mobility of digital devices, we could create (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  21
    A Computer-Based Method for the Investigation of Human Behavior in the Iterative Chicken Game.Sung-Phil Kim, Minju Kim, Jongmin Lee, Yang Seok Cho & Oh-Sang Kwon - 2021 - Frontiers in Psychology 12.
    The present study develops an artificial agent that plays the iterative chicken game based on a computational model that describes human behavior in competitive social interactions in terms of fairness. The computational model we adopted in this study, named as the self-concept fairness model, decides the agent’s action according to the evaluation of fairness of both opponent and self. We implemented the artificial agent in a computer program with a set of parameters adjustable by researchers. These parameters allow (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  70
    Computational Perspectives in the History of Science: To the Memory of Peter Damerow.Manfred D. Laubichler, Jane Maienschein & Jürgen Renn - 2013 - Isis 104 (1):119-130.
    Computational methods and perspectives can transform the history of science by enabling the pursuit of novel types of questions, dramatically expanding the scale of analysis , and offering novel forms of publication that greatly enhance access and transparency. This essay presents a brief summary of a computational research system for the history of science, discussing its implications for research, education, and publication practices and its connections to the open-access movement and similar transformations in the natural and social (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  26.  4
    Intentional identity revisited.Ahti Pietarinen A. School of Cognitive, Computing Sciences, Falmer, Brighton, BN1 9QH & Uk - 2010 - Nordic Journal of Philosophical Logic 6 (2):147-188.
    The problem of intentional identity, as originally offered by Peter Geach, says that there can be an anaphoric link between an indefinite term and a pronoun across a sentential boundary and across propositional attitude contexts, where the actual existence of an individual for the indefinite term is not presupposed. In this paper, a semantic resolution to this elusive puzzle is suggested, based on a new quantified intensional logic and game-theoretic semantics (GTS) of imperfect information. This constellation leads to an expressive (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27. Computational science and scientific method.Paul Humphreys - 1995 - Minds and Machines 5 (4):499-512.
    The process of constructing mathematical models is examined and a case made that the construction process is an integral part of the justification for the model. The role of heuristics in testing and modifying models is described and some consequences for scientific methodology are drawn out. Three different ways of constructing the same model are detailed to demonstrate the claims made here.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  28. Method in computer ethics: Towards a multi-level interdisciplinary approach. [REVIEW]Philip Brey - 2000 - Ethics and Information Technology 2 (2):125-129.
    This essay considers methodological aspects ofcomputer ethics and argues for a multi-levelinterdisciplinary approach with a central role forwhat is called disclosive computer ethics. Disclosivecomputer ethics is concerned with the moraldeciphering of embedded values and norms in computersystems, applications and practices. In themethodology for computer ethics research proposed inthe essay, research takes place at three levels: thedisclosure level, in which ideally philosophers,computer scientists and social scientists collaborateto disclose embedded normativity in computer systemsand practices, the theoretical level, in whichphilosophers develop and modify (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  29.  16
    A Computational Complexity-Based Method for Predicting Scholars’ Ages through Articles’ Information.Jun Zhang, Xiaoyan Su, Mingliang Hou & Jing Ren - 2021 - Complexity 2021:1-15.
    Many scholars have conducted in-depth research on the evaluation and prediction of scholars’ scientific impact and meanwhile discovered various factors that affect the success of scholars. Among all these relevant factors, scholars’ ages have been universally acknowledged as one of the most important factors for it can shed light on many practical issues, e.g., finding supervisors, discovering rising stars, and research funding or award applications. However, due to the inaccessibility or the privacy issues of acquiring scholars’ personal data, there is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  15
    Supervision method of indoor construction engineering quality acceptance based on cloud computing.Jian Zhang - 2022 - Journal of Intelligent Systems 31 (1):795-805.
    As an important part of Chinese economy, the construction industry has a great contribution to the economy, and plays an important role in the Chinese economic development. Therefore, it has certain research significance for the quality acceptance supervision method of construction engineering. This article takes Shenzhen S project as an example, combined with cloud computing, discusses the quality acceptance and supervision methods of indoor construction projects. In the introduction to the technical part, this article first briefly introduces the definition (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  25
    Complexity Computer Simulation in the Study of the Overall Playing Method of Campus Football.Zhao Dai - 2021 - Complexity 2021:1-9.
    With the mutual exchange and integration of world football, modern football is in an increasingly comprehensive direction. This research mainly discusses complexity computer simulation in the study of the overall play of campus football. Complexity computer simulation is used to design the background of the simulated football field, and the area is divided according to the size ratio of the actual football field. Then, it uses drawing software to draw the football and player controls. The construction of the knowledge base (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  75
    Using brain-computer interfaces: a scoping review of studies employing social research methods.Johannes Kögel, Jennifer R. Schmid, Ralf J. Jox & Orsolya Friedrich - 2019 - BMC Medical Ethics 20 (1):18.
    The rapid expansion of research on Brain-Computer Interfaces is not only due to the promising solutions offered for persons with physical impairments. There is also a heightened need for understanding BCIs due to the challenges regarding ethics presented by new technology, especially in its impact on the relationship between man and machine. Here we endeavor to present a scoping review of current studies in the field to gain insight into the complexity of BCI use. By examining studies related to BCIs (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  33.  21
    Computational opposition analysis using word embeddings: A method for strategising resonant informal argument.Cameron Shackell & Laurianne Sitbon - 2020 - Argument and Computation 10 (3):301-317.
    In informal argument, an essential step is to ask what will “resonate” with a particular audience and hence persuade. Marketers, for example, may recommend a certain colour for a new soda can becau...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34.  15
    The difference a method makes : methods as epistemic objects in computational science.Matthew Spencer - 2019 - Distinktion: Journal of Social Theory.
    Computational science is intrinsically interdisciplinary; the methods of one scientist may be the objects of study for another. This essay is an attempt to develop an interdisciplinary framework that can analyse research into methods as a distinctive kind of epistemic orientation in science, drawing on two examples from fieldwork with a group of specialists in computer modelling. Where methods for simulation are objects of research in their own right, they are distinct in kind to the objects (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  20
    How can computer-based methods help researchers to investigate news values in large datasets? A corpus linguistic study of the construction of newsworthiness in the reporting on Hurricane Katrina.Helen Caple, Monika Bednarek & Amanda Potts - 2015 - Discourse and Communication 9 (2):149-172.
    This article uses a 36-million word corpus of news reporting on Hurricane Katrina in the United States to explore how computer-based methods can help researchers to investigate the construction of newsworthiness. It makes use of Bednarek and Caple’s discursive approach to the analysis of news values, and is both exploratory and evaluative in nature. One aim is to test and evaluate the integration of corpus techniques in applying discursive news values analysis. We employ and evaluate corpus techniques that have (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  31
    Beyond computational difficulties: Survey of the two decades from the elaboration to the extensive application of the Hartree-Fock method.Jean-Philippe Martinez - 2017 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 60:123-135.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Info-computational Constructivism and Cognition.G. Dodig-Crnkovic - 2014 - Constructivist Foundations 9 (2):223-231.
    Context: At present, we lack a common understanding of both the process of cognition in living organisms and the construction of knowledge in embodied, embedded cognizing agents in general, including future artifactual cognitive agents under development, such as cognitive robots and softbots. Purpose: This paper aims to show how the info-computational approach (IC) can reinforce constructivist ideas about the nature of cognition and knowledge and, conversely, how constructivist insights (such as that the process of cognition is the process of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  38.  8
    Stochastic methods and computer techniques in quantum dynamics.Heinrich Mitter & Ludwig Pittner (eds.) - 1984 - New York: Springer Verlag.
  39.  25
    Computer-specific methods.R. S. Rodger - 1978 - Behavioral and Brain Sciences 1 (1):113-114.
  40. Methods and Software for Computing Mathematical Functions-A Matlab Implementation of an Algorithm for Computing Integrals of Products of Bessel Functions.Joris Van Deun & Ronald Cools - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 284-295.
     
    Export citation  
     
    Bookmark  
  41.  34
    Logical methods in mathematics and computer science: A symposium in honor of Anil Nerode's sixtieth birthday.Richard A. Shore - 1993 - Journal of Symbolic Logic 58 (3):1091-1092.
  42.  55
    Nonstandard methods in combinatorics and theoretical computer science.M. M. Richter & M. E. Szabo - 1988 - Studia Logica 47 (3):181 - 191.
  43.  20
    Computational Dialectics Based on Specialization and Generalization–A New Reasoning Method for Conflict Resolution.Hiroyuki Kido & Masahito Kurihara - 2009 - In Hiromitsu Hattori, Takahiro Kawamura, Tsuyoshi Ide, Makoto Yokoo & Yohei Murakami, New Frontiers in Artificial Intelligence: JSAI 2008 Conference and Workshops, Asahikawa, Japan, June 11-13, 2008, Revised Selected Papers. Springer. pp. 228--241.
  44. Computational Intelligence Approaches and Methods for Security Engineering-Development of an Attack Packet Generator Applying an NP to the Intelligent APS.Wankyung Kim & Wooyoung Soh - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 4252--709.
  45.  15
    Computation of electronic structure and magnetic properties of strongly correlated materials with LDA+DMFT method.S. L. Skornyakov & V. I. Anisimov - 2015 - Philosophical Magazine 95 (12):1244-1259.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  23
    Iterative Characterizations of Computable Unary Functions: A General Method.Stefano Mazzanti - 1997 - Mathematical Logic Quarterly 43 (1):29-38.
    Iterative characterizations of computable unary functions are useful patterns for the definition of programming languages based on iterative constructs. The features of such a characterization depend on the pairing producing it: this paper offers an infinite class of pairings involving very nice features.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  18
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  19
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security event into (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  21
    Stochastic Parameter Identification Method for Driving Trajectory Simulation Processes Based on Mobile Edge Computing and Self-Organizing Feature Mapping.Jingfeng Yang, Zhiyong Luo, Nanfeng Zhang, Jinchao Xiao, Honggang Wang, Shengpei Zhou, Xiaosong Liu & Ming Li - 2021 - Complexity 2021:1-8.
    With the rapid development of sensor technology for automated driving applications, the fusion, analysis, and application of multimodal data have become the main focus of different scenarios, especially in the development of mobile edge computing technology that provides more efficient algorithms for realizing the various application scenarios. In the present paper, the vehicle status and operation data were acquired by vehicle-borne and roadside units of electronic registration identification of motor vehicles. In addition, a motion model and an identification system for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  32
    Ewa Orłowska on Relational Methods in Logic and Computer Science.Michał Zawidzki & Joanna Golińska-Pilarek (eds.) - 2018 - Cham, Switzerland: Springer Verlag.
    This book is a tribute to Professor Ewa Orłowska, a Polish logician who was celebrating the 60th year of her scientific career in 2017. It offers a collection of contributed papers by different authors and covers the most important areas of her research. Prof. Orłowska made significant contributions to many fields of logic, such as proof theory, algebraic methods in logic and knowledge representation, and her work has been published in 3 monographs and over 100 articles in internationally acclaimed (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 976