Query Text stringlengths 10 59.9k | Ranking 1 stringlengths 10 4.53k | Ranking 2 stringlengths 10 50.9k | Ranking 3 stringlengths 10 6.78k | Ranking 4 stringlengths 10 59.9k | Ranking 5 stringlengths 10 6.78k | Ranking 6 stringlengths 10 59.9k | Ranking 7 stringlengths 10 59.9k | Ranking 8 stringlengths 10 6.78k | Ranking 9 stringlengths 10 59.9k | Ranking 10 stringlengths 10 50.9k | Ranking 11 stringlengths 13 6.78k | Ranking 12 stringlengths 14 50.9k | Ranking 13 stringlengths 24 2.74k | score_0 float64 1 1.25 | score_1 float64 0 0.25 | score_2 float64 0 0.25 | score_3 float64 0 0.24 | score_4 float64 0 0.24 | score_5 float64 0 0.24 | score_6 float64 0 0.21 | score_7 float64 0 0.07 | score_8 float64 0 0.03 | score_9 float64 0 0.01 | score_10 float64 0 0 | score_11 float64 0 0 | score_12 float64 0 0 | score_13 float64 0 0 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Quadrant of euphoria: a crowdsourcing platform for QoE assessment Existing quality of experience assessment methods, subjective or objective, suffer from either or both problems of inaccurate experiment tools and expensive personnel cost. The panacea for them, as we have come to realize, lies in the joint application o... | Queuing based optimal scheduling mechanism for QoE provisioning in cognitive radio relaying network In cognitive radio network (CRN), secondary users (SU) can share the licensed spectrum with the primary users (PU). Compared with the traditional network, spectrum utilization in CRN will be greatly improved. In order to... | Mobile quality of experience: Recent advances and challenges Quality of Experience (QoE) is important from both a user perspective, since it assesses the quality a user actually experiences, and a network perspective, since it is important for a provider to dimension its network to support the necessary QoE. This paper... | Personalized user engagement modeling for mobile videos. The ever-increasing mobile video services and users’ demand for better video quality have boosted research into the video Quality-of-Experience. Recently, the concept of Quality-of-Experience has evolved to Quality-of-Engagement, a more actionable metric to evalu... | QoE-based transport optimization for video delivery over next generation cellular networks Video streaming is considered as one of the most important and challenging applications for next generation cellular networks. Current infrastructures are not prepared to deal with the increasing amount of video traffic. The curr... | Guest Editorial QoE-Aware Wireless Multimedia Systems. The 11 papers in this special issue cover a range of topics and can be logically organized in three groups, focusing on QoE-aware media protection, QoE assessment and modelling, and multi-user-QoE management. | The user in experimental computer systems research Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance evaluation of the systems, and (2) ignores opportunities. We summarize our experiences with (... | Quality of experience management in mobile cellular networks: key issues and design challenges. Telecom operators have recently faced the need for a radical shift from technical quality requirements to customer experience guarantees. This trend has emerged due to the constantly increasing amount of mobile devices and a... | Impact Of Mobile Devices And Usage Location On Perceived Multimedia Quality We explore the quality impact when audiovisual content is delivered to different mobile devices. Subjects were shown the same sequences on five different mobile devices and a broadcast quality television. Factors influencing quality ratings inc... | MIMO technologies in 3GPP LTE and LTE-advanced 3rd Generation Partnership Project (3GPP) has recently completed the specification of the Long Term Evolution (LTE) standard. Majority of the world's operators and vendors are already committed to LTE deployments and developments, making LTE the market leader in the upcomi... | The price of privacy and the limits of LP decoding This work is at theintersection of two lines of research. One line, initiated by Dinurand Nissim, investigates the price, in accuracy, of protecting privacy in a statistical database. The second, growing from an extensive literature on compressed sensing (see in partic... | Parameterized interconnect order reduction with explicit-and-implicit multi-parameter moment matching for inter/intra-die variations In this paper we propose a novel parameterized interconnect order reduction algorithm, CORE, to efficiently capture both inter-die and intra-die variations. CORE applies a two-step explic... | Properties of Interval-Valued Fuzzy Relations, Atanassov's Operators and Decomposable Operations In this paper we study properties of interval-valued fuzzy relations which were introduced by L.A. Zadeh in 1975. Fuzzy set theory turned out to be a useful tool to describe situations in which the data are imprecise or vag... | Total variation minimization with separable sensing operator Compressed Imaging is the theory that studies the problem of image recovery from an under-determined system of linear measurements. One of the most popular methods in this field is Total Variation (TV) Minimization, known for accuracy and computational effici... | 1.018056 | 0.020435 | 0.020435 | 0.020435 | 0.017354 | 0.011802 | 0.008505 | 0.002684 | 0.000186 | 0.000007 | 0 | 0 | 0 | 0 |
Hedges: A study in meaning criteria and the logic of fuzzy concepts | The Vienna Definition Language | General formulation of formal grammars By extracting the basic properties common to the formal grammars appeared in existing literatures, we develop a general formulation of formal grammars. We define a pseudo grammar and derive from it the well-known probabilistic, fuzzy grammars and so on. Moreover, several interesti... | Matrix Equations and Normal Forms for Context-Free Grammars The relationship between the set of productions of a context-free grammar and the corresponding set of defining equations is first pointed out. The closure operation on a matrix of strings is defined and this concept is used to formalize the solution to a set ... | A Note on Fuzzy Sets | Fuzzy modifiers based on fuzzy relations In this paper we introduce a new type of fuzzy modifiers (i.e. mappings that transform a fuzzy set into a modified fuzzy set) based on fuzzy relations. We show how they can be applied for the representation of weakening adverbs (more or less, roughly) and intensifying adverbs (v... | Linguistic description of the human gait quality The human gait is a complex phenomenon that is repeated in time following an approximated pattern. Using a three-axial accelerometer fixed in the waist, we can obtain a temporal series of measures that contains a numerical description of this phenomenon. Nevertheless, ev... | COR: a methodology to improve ad hoc data-driven linguistic rule learning methods by inducing cooperation among rules This paper introduces a new learning methodology to quickly generate accurate and simple linguistic fuzzy models: the cooperative rules (COR) methodology. It acts on the consequents of the fuzzy rules t... | Contrast of a fuzzy relation In this paper we address a key problem in many fields: how a structured data set can be analyzed in order to take into account the neighborhood of each individual datum. We propose representing the dataset as a fuzzy relation, associating a membership degree with each element of the relatio... | Extensions of the multicriteria analysis with pairwise comparison under a fuzzy environment Multicriteria decision-making (MCDM) problems often involve a complex decision process in which multiple requirements and fuzzy conditions have to be taken into consideration simultaneously. The existing approaches for solving t... | A fuzzy MCDM method for solving marine transshipment container port selection problems “Transshipment” is a very popular and important issue in the present international trade container transportation market. In order to reduce the international trade container transportation operation cost, it is very important for sh... | Sparse Reconstruction by Separable Approximation Finding sparse approximate solutions to large underdetermined linear systems of equations is a common problem in signal/image processing and statistics. Basis pursuit, the least absolute shrinkage and selection operator (LASSO), wavelet-based deconvolution and reconstruc... | A fuzzy logic system for the detection and recognition of handwritten street numbers Fuzzy logic is applied to the problem of locating and reading street numbers in digital images of handwritten mail. A fuzzy rule-based system is defined that uses uncertain information provided by image processing and neural network-ba... | A possibilistic approach to the modeling and resolution of uncertain closed-loop logistics Closed-loop logistics planning is an important tactic for the achievement of sustainable development. However, the correlation among the demand, recovery, and landfilling makes the estimation of their rates uncertain and difficul... | 1.016606 | 0.025015 | 0.025015 | 0.025015 | 0.010011 | 0.002848 | 0.000502 | 0.000028 | 0.000006 | 0.000003 | 0.000002 | 0 | 0 | 0 |
Linguistic Decision-Making Models Using linguistic values to assess results and information about external factors is quite usual in real decision situations. In this article we present a general model for such problems. Utilities are evaluated in a term set of labels and the information is supposed to be a linguistic ... | Multi-criteria analysis for a maintenance management problem in an engine factory: rational choice The industrial organization needs to develop better methods for evaluating the performance of its projects. We are interested in the problems related to pieces with differing degrees of dirt. In this direction, we propose... | Evaluating Government Websites Based On A Fuzzy Multiple Criteria Decision-Making Approach This paper presents a framework of website quality evaluation for measuring the performance of government websites. Multiple criteria decision-making (MCDM) is a widely used tool for evaluating and ranking problems containing mul... | Group decision making with linguistic preference relations with application to supplier selection Linguistic preference relation is a useful tool for expressing preferences of decision makers in group decision making according to linguistic scales. But in the real decision problems, there usually exist interactive phen... | A hybrid multi-criteria decision-making model for firms competence evaluation In this paper, we present a hybrid multi-criteria decision-making (MCDM) model to evaluate the competence of the firms. According to the competence-based theory reveals that firm competencies are recognized from exclusive and unique capabilit... | Fuzzy relational algebra for possibility-distribution-fuzzy-relational model of fuzzy data In the real world, there exist a lot of fuzzy data which cannot or need not be precisely defined. We distinguish two types of fuzziness: one in an attribute value itself and the other in an association of them. For such fuzzy dat... | Approaches to manage hesitant fuzzy linguistic information based on the cosine distance and similarity measures for HFLTSs and their application in qualitative decision making We introduce a family of novel distance and similarity measures for HFLTSs.We develop a cosine-distance-based HFL-TOPSIS method.We develop a cos... | Linguistic modeling by hierarchical systems of linguistic rules In this paper, we propose an approach to design linguistic models which are accurate to a high degree and may be suitably interpreted. This approach is based on the development of a hierarchical system of linguistic rules learning methodology. This methodo... | A satisfactory-oriented approach to multiexpert decision-making with linguistic assessments. This paper proposes a multiexpert decision-making (MEDM) method with linguistic assessments, making use of the notion of random preferences and a so-called satisfactory principle. It is well known that decision-making problems ... | A causal and effect decision making model of service quality expectation using grey-fuzzy DEMATEL approach This research uses a solution based on a combined grey-fuzzy DEMATEL method to deal with the objective of the study. This study is aimed to present a perception approach to deal with real estate agent service qual... | Automorphisms Of The Algebra Of Fuzzy Truth Values This paper is an investigation of the automorphisms of the algebra of truth values of type-2 fuzzy sets. This algebra contains isomorphic copies of the truth value algebras of type-1 and of iriterval-valued fuzzy sets. It is shown that these subalgebras are characteris... | Compressive sensing for sparsely excited speech signals Compressive sensing (CS) has been proposed for signals with sparsity in a linear transform domain. We explore a signal dependent unknown linear transform, namely the impulse response matrix operating on a sparse excitation, as in the linear model of speech product... | Handling Fuzziness In Temporal Databases This paper proposes a new data model, called FuzzTime, which is capable of handling both aspects of fuzziness and time of data. These two features can always be encountered simultaneously in many applications. This work is aimed to be a conceptual framework for advanced applicat... | Generating realistic stimuli for accurate power grid analysis Power analysis tools are an integral component of any current power sign-off methodology. The performance of a design's power grid affects the timing and functionality of a circuit, directly impacting the overall performance. Ensuring power grid robustness i... | 1.007657 | 0.006847 | 0.006847 | 0.002334 | 0.001764 | 0.001351 | 0.000678 | 0.00036 | 0.000121 | 0.000043 | 0.000005 | 0 | 0 | 0 |
View Scalable Multiview Video Coding Using 3-D Warping With Depth Map Multiview video coding demands high compression rates as well as view scalability, which enables the video to be displayed on a multitude of different terminals. In order to achieve view scalability, it is necessary to limit the inter-view prediction... | Shape-adaptivewavelet encoding of depth maps We present a novel depth-map codec aimed at free-viewpoint 3DTV. The proposed codec relies on a shape-adaptive wavelet transform and an explicit representation of the locations of major depth edges. Unlike classical wavelet transforms, the shape-adaptive transform generates ... | A new methodology to derive objective quality assessment metrics for scalable multiview 3D video coding With the growing demand for 3D video, efforts are underway to incorporate it in the next generation of broadcast and streaming applications and standards. 3D video is currently available in games, entertainment, educ... | Depth Reconstruction Filter and Down/Up Sampling for Depth Coding in 3-D Video A depth image represents three-dimensional (3-D) scene information and is commonly used for depth image-based rendering (DIBR) to support 3-D video and free-viewpoint video applications. The virtual view is generally rendered by the DIBR tec... | View synthesis prediction for multiview video coding We propose a rate-distortion-optimized framework that incorporates view synthesis for improved prediction in multiview video coding. In the proposed scheme, auxiliary information, including depth data, is encoded and used at the decoder to generate the view synthesis... | 3-D Video Representation Using Depth Maps Current 3-D video (3DV) technology is based on stereo systems. These systems use stereo video coding for pictures delivered by two input cameras. Typically, such stereo systems only reproduce these two camera views at the receiver and stereoscopic displays for multiple viewers ... | Subjective Study On Compressed Asymmetric Stereoscopic Video Asymmetric stereoscopic video coding takes advantage of the binocular suppression of the human vision by representing one of the views with a lower quality. This paper describes a subjective quality test with asymmetric stereoscopic video. Different options f... | Transport and Storage Systems for 3-D Video Using MPEG-2 Systems, RTP, and ISO File Format Three-dimensional video based on stereo and multiview video representations is currently being introduced to the home through various channels, including broadcast such as via cable, terrestrial and satellite transmission, stream... | On the way towards fourth-generation mobile: 3GPP LTE and LTE-advanced Long-TermEvolution (LTE) is the new standard recently specified by the 3GPP on the way towards fourth-generation mobile. This paper presents the main technical features of this standard as well as its performance in terms of peak bit rate and averag... | Look-ahead rate adaptation algorithm for DASH under varying network environments Dynamic Adaptive Streaming over HTTP (DASH) is slowly becoming the most popular online video streaming technology. DASH enables the video player to adapt the quality of the multimedia content being downloaded in order to match the varying ... | A Definition of a Nonprobabilistic Entropy in the Setting of Fuzzy Sets Theory | Combination of interval-valued fuzzy set and soft set The soft set theory, proposed by Molodtsov, can be used as a general mathematical tool for dealing with uncertainty. By combining the interval-valued fuzzy set and soft set models, the purpose of this paper is to introduce the concept of the interval-valued fuzzy so... | On the sparseness of 1-norm support vector machines. There is some empirical evidence available showing that 1-norm Support Vector Machines (1-norm SVMs) have good sparseness; however, both how good sparseness 1-norm SVMs can reach and whether they have a sparser representation than that of standard SVMs are not clear.... | Path criticality computation in parameterized statistical timing analysis This paper presents a method to compute criticality probabilities of paths in parameterized statistical static timing analysis (SSTA). We partition the set of all the paths into several groups and formulate the path criticality into a joint proba... | 1.030193 | 0.028999 | 0.028571 | 0.021751 | 0.009696 | 0.005693 | 0.000597 | 0.000061 | 0.000006 | 0 | 0 | 0 | 0 | 0 |
Differential RAID: rethinking RAID for SSD reliability Deployment of SSDs in enterprise settings is limited by the low erase cycles available on commodity devices. Redundancy solutions such as RAID can potentially be used to protect against the high Bit Error Rate (BER) of aging SSDs. Unfortunately, such solutions wear... | On efficient wear leveling for large-scale flash-memory storage systems Flash memory won its edge over many other storage media for embedded systems, because it provides better tolerance to the extreme environments which embedded systems are exposed to. In this paper, techniques referred to as wear leveling for the len... | A set-based mapping strategy for flash-memory reliability enhancement With wide applicability of flash memory in various application domains, reliability has become a very critical issue. This research is motivated by the needs to resolve the lifetime problem of flash memory and a strong demand in turning thrown-away f... | A commitment-based management strategy for the performance and reliability enhancement of flash-memory storage systems Cost has been a major driving force in the development of the flash memory technology, but has also introduced serious challenges on reliability and performance for future products. In this work, we pr... | A version-based strategy for reliability enhancement of flash file systems In recent years, reliability has become one critical issue in the designs of flash file systems due to the growing unreliability of advanced flash-memory chips. In this paper, a version-based strategy with optimal space utilization is proposed t... | Statistical timing based on incomplete probabilistic descriptions of parameter uncertainty Existing approaches to timing analysis under uncertainty are based on restrictive assumptions. Statistical STA techniques assume that the full probabilistic distribution of parameter uncertainty is available; in reality, the comp... | Some Defects in Finite-Difference Edge Finders This work illustrates and explains various artifacts in the output of five finite difference edge finders, those of J.F. Canny (1983, 1986), R.A. Boie et al. (1986) and R.A. Boie and I.J. Cox (1987), and three variations on that of D. Marr and E.C. Hildreth (1980), reimple... | A Tutorial on Support Vector Machines for Pattern Recognition The tutorial starts with an overview of the concepts of VC dimension and structural risk minimization. We then describe linear Support Vector Machines (SVMs) for separable and non-separable data, working through a non-trivial example in detail. We describe a... | Reconstruction of a low-rank matrix in the presence of Gaussian noise. This paper addresses the problem of reconstructing a low-rank signal matrix observed with additive Gaussian noise. We first establish that, under mild assumptions, one can restrict attention to orthogonally equivariant reconstruction methods, which ... | Proceedings of the 41th Design Automation Conference, DAC 2004, San Diego, CA, USA, June 7-11, 2004 | Using polynomial chaos to compute the influence of multiple random surfers in the PageRank model The PageRank equation computes the importance of pages in a web graph relative to a single random surfer with a constant teleportation coefficient. To be globally relevant, the teleportation coefficient should account for t... | An overview of quality of experience measurement challenges for video applications in IP networks The increase in multimedia content on the Internet has created a renewed interest in quality assessment. There is however a main difference from the traditional quality assessment approaches, as now, the focus relies on th... | Fuzzy Concepts and Formal Methods: A Fuzzy Logic Toolkit for Z It has been recognised that formal methods are useful as a modelling tool in requirements engineering. Specification languages such as Z permit the precise and unambiguous modelling of system properties and behaviour. However some system problems, particula... | Designing type-2 fuzzy logic system controllers via fuzzy Lyapunov synthesis for the output regulator of a servomechanism with nonlinear backlash Fuzzy Lyapunov Synthesis is extended to the design of Type-2 Fuzzy Logic System Controllers for the output regulation problem for a servomechanism with nonlinear backlash. Th... | 1.2105 | 0.2105 | 0.2105 | 0.10525 | 0.0025 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Automorphisms Of The Algebra Of Fuzzy Truth Values This paper is an investigation of the automorphisms of the algebra of truth values of type-2 fuzzy sets. This algebra contains isomorphic copies of the truth value algebras of type-1 and of iriterval-valued fuzzy sets. It is shown that these subalgebras are characteris... | Development of a type-2 fuzzy proportional controller Studies have shown that PID controllers can be realized by type-1 (conventional) fuzzy logic systems (FLSs). However, the input-output mappings of such fuzzy PID controllers are fixed. The control performance would, therefore, vary if the system parameters are uncer... | Some general comments on fuzzy sets of type-2 This paper contains some general comments on the algebra of truth values of fuzzy sets of type 2. It details the precise mathematical relationship with the algebras of truth values of ordinary fuzzy sets and of interval-valued fuzzy sets. Subalgebras of the algebra of truth... | Sensed Signal Strength Forecasting for Wireless Sensors Using Interval Type-2 Fuzzy Logic System. In this paper, we present a new approach for sensed signal strength forecasting in wireless sensors using interval type-2 fuzzy logic system (FLS). We show that a type-2 fuzzy membership function, i.e., a Gaussian MF with ... | T-Norms for Type-2 Fuzzy Sets This paper is concerned with the definition of t-norms on the algebra of truth values of type-2 fuzzy sets. Our proposed definition extends the definition of ordinary t-norms on the unit interval and extends our definition of t-norms on the algebra of truth values for interval-valued fuzzy... | Pattern recognition using type-II fuzzy sets Type II fuzzy sets are a generalization of the ordinary fuzzy sets in which the membership value for each member of the set is itself a fuzzy set in [0, 1]. We introduce a similarity measure for measuring the similarity, or compatibility, between two type-II fuzzy sets. With... | Xor-Implications and E-Implications: Classes of Fuzzy Implications Based on Fuzzy Xor The main contribution of this paper is to introduce an autonomous definition of the connective ''fuzzy exclusive or'' (fuzzy Xor, for short), which is independent from others connectives. Also, two canonical definitions of the connect... | Multivariate modeling and type-2 fuzzy sets This paper explores the link between type-2 fuzzy sets and multivariate modeling. Elements of a space X are treated as observations fuzzily associated with values in a multivariate feature space. A category or class is likewise treated as a fuzzy allocation of feature values ... | A comparative study of ranking methods, similarity measures and uncertainty measures for interval type-2 fuzzy sets Ranking methods, similarity measures and uncertainty measures are very important concepts for interval type-2 fuzzy sets (IT2 FSs). So far, there is only one ranking method for such sets, whereas there ar... | Similarity Measures Between Type-2 Fuzzy Sets In this paper, we give similarity measures between type-2 fuzzy sets and provide the axiom definition and properties of these measures. For practical use, we show how to compute the similarities between Gaussian type-2 fuzzy sets. Yang and Shih's [22] algorithm, a clusterin... | Structure segmentation and recognition in images guided by structural constraint propagation In some application domains, such as medical imaging, the objects that compose the scene are known as well as some of their properties and their spatial arrangement. We can take advantage of this knowledge to perform the segmen... | Sublinear time, measurement-optimal, sparse recovery for all An approximate sparse recovery system in l1 norm makes a small number of measurements of a noisy vector with at most k large entries and recovers those heavy hitters approximately. Formally, it consists of parameters N, k, ε, an m-by-N measurement matrix, φ, ... | Parallel Opportunistic Routing in Wireless Networks We study benefits of opportunistic routing in a large wireless ad hoc network by examining how the power, delay, and total throughput scale as the number of source–destination pairs increases up to the operating maximum. Our opportunistic routing is novel in a sense t... | Evaluating process performance based on the incapability index for measurements with uncertainty Process capability indices are widely used in industry to measure the ability of firms or their suppliers to meet quality specifications. The index C"P"P, which is easy to use and analytically tractable, has been successful... | 1.022465 | 0.024448 | 0.019227 | 0.014641 | 0.008308 | 0.001918 | 0.000234 | 0.000087 | 0.000042 | 0.000014 | 0.000001 | 0 | 0 | 0 |
Fuzzy decision making with immediate probabilities We developed a new decision-making model with probabilistic information and used the concept of the immediate probability to aggregate the information. This type of probability modifies the objective probability by introducing the attitudinal character of the decision ... | Comparing approximate reasoning and probabilistic reasoning using the Dempster--Shafer framework We investigate the problem of inferring information about the value of a variable V from its relationship with another variable U and information about U. We consider two approaches, one using the fuzzy set based theory of ... | FIOWHM operator and its application to multiple attribute group decision making To study the problem of multiple attribute decision making in which the decision making information values are triangular fuzzy number, a new group decision making method is proposed. Then the calculation steps to solve it are given. As the... | A Method Based on OWA Operator and Distance Measures for Multiple Attribute Decision Making with 2-Tuple Linguistic Information In this paper we develop a new method for 2-tuple linguistic multiple attribute decision making, namely the 2-tuple linguistic generalized ordered weighted averaging distance (2LGOWAD) operato... | Fuzzy induced generalized aggregation operators and its application in multi-person decision making We present a wide range of fuzzy induced generalized aggregation operators such as the fuzzy induced generalized ordered weighted averaging (FIGOWA) and the fuzzy induced quasi-arithmetic OWA (Quasi-FIOWA) operator. They... | Decision making with extended fuzzy linguistic computing, with applications to new product development and survey analysis Fuzzy set theory, with its ability to capture and process uncertainties and vagueness inherent in subjective human reasoning, has been under continuous development since its introduction in the 196... | A sequential selection process in group decision making with a linguistic assessment approach In this paper a Sequential Selection Process in Group Decision Making underlinguistic assessments is presented, where a set of linguistic preference relationsrepresents individuals preferences. A collective linguistic prefere... | Fuzzy multiple criteria forestry decision making based on an integrated VIKOR and AHP approach Forestation and forest preservation in urban watersheds are issues of vital importance as forested watersheds not only preserve the water supplies of a city but also contribute to soil erosion prevention. The use of fuzzy mul... | Web-based Multi-Criteria Group Decision Support System with Linguistic Term Processing Function Organizational decisions are often made in groups where group members may be distributed geographically in different locations. Furthermore, a decision-making process, in practice, frequently involves various uncertain facto... | Perceptual reasoning for perceptual computing: a similarity-based approach Perceptual reasoning (PR) is an approximate reasoning method that can be used as a computing-with-words (CWW) engine in perceptual computing. There can be different approaches to implement PR, e.g., firing-interval-based PR (FI-PR), which has be... | Systematic image processing for diagnosing brain tumors: A Type-II fuzzy expert system approach This paper presents a systematic Type-II fuzzy expert system for diagnosing the human brain tumors (Astrocytoma tumors) using T"1-weighted Magnetic Resonance Images with contrast. The proposed Type-II fuzzy image processing ... | Gossip Algorithms for Distributed Signal Processing Gossip algorithms are attractive for in-network processing in sensor networks because they do not require any specialized routing, there is no bottleneck or single point of failure, and they are robust to unreliable wireless network conditions. Recently, there has bee... | Sublinear compressive sensing reconstruction via belief propagation decoding We propose a new compressive sensing scheme, based on codes of graphs, that allows for joint design of sensing matrices and low complexity reconstruction algorithms. The compressive sensing matrices can be shown to offer asymptotically optimal... | Thermal switching error versus delay tradeoffs in clocked QCA circuits The quantum-dot cellular automata (QCA) model offers a novel nano-domain computing architecture by mapping the intended logic onto the lowest energy configuration of a collection of QCA cells, each with two possible ground states. A four-phased cloc... | 1.021808 | 0.024 | 0.022362 | 0.020677 | 0.007839 | 0.003506 | 0.001297 | 0.000357 | 0.000171 | 0.000078 | 0.000001 | 0 | 0 | 0 |
Uncertainty quantification of electronic and photonic ICs with non-Gaussian correlated process variations Since the invention of generalized polynomial chaos in 2002, uncertainty quantification has impacted many engineering fields, including variation-aware design automation of integrated circuits and integrated photon... | Multi-Wafer Virtual Probe: Minimum-cost variation characterization by exploring wafer-to-wafer correlation In this paper, we propose a new technique, referred to as Multi-Wafer Virtual Probe (MVP) to efficiently model wafer-level spatial variations for nanoscale integrated circuits. Towards this goal, a novel Bayesian ... | Bayesian Model Fusion: A statistical framework for efficient pre-silicon validation and post-silicon tuning of complex analog and mixed-signal circuits In this paper, we describe a novel statistical framework, referred to as Bayesian Model Fusion (BMF), that allows us to minimize the simulation and/or measurement cost ... | Tensor Computation: A New Framework for High-Dimensional Problems in EDA. Many critical electronic design automation (EDA) problems suffer from the curse of dimensionality, i.e., the very fast-scaling computational burden produced by large number of parameters and/or unknown variables. This phenomenon may be caused by ... | Stochastic Testing Method for Transistor-Level Uncertainty Quantification Based on Generalized Polynomial Chaos Uncertainties have become a major concern in integrated circuit design. In order to avoid the huge number of repeated simulations in conventional Monte Carlo flows, this paper presents an intrusive spectral s... | Semantics of Context-Free Languages Meaning" may be assigned to a string in a context-free language by defining "at- tributes" of the symbols in a derivation tree for that string. The attributes can be de- fined by functions associated with each production in the grammar. This paper examines the implications of this pr... | Sets with type-2 operations The algebra of truth values of type-2 fuzzy sets consists of all mappings of the unit interval to itself, with type-2 operations that are convolutions of ordinary max and min operations. This paper is concerned with a special subalgebra of this truth value algebra, namely the set of nonzero ... | Fuzzy logic systems for engineering: a tutorial A fuzzy logic system (FLS) is unique in that it is able to simultaneously handle numerical data and linguistic knowledge. It is a nonlinear mapping of an input data (feature) vector into a scalar output, i.e., it maps numbers into numbers. Fuzzy set theory and fuzzy logic... | Convergence Rates of Best N-term Galerkin Approximations for a Class of Elliptic sPDEs Deterministic Galerkin approximations of a class of second order elliptic PDEs with random coefficients on a bounded domain D⊂ℝd are introduced and their convergence rates are estimated. The approximations are based on expansions of ... | Proceedings of the 47th Design Automation Conference, DAC 2010, Anaheim, California, USA, July 13-18, 2010 | Restricted Eigenvalue Properties for Correlated Gaussian Designs Methods based on l1-relaxation, such as basis pursuit and the Lasso, are very popular for sparse regression in high dimensions. The conditions for success of these methods are now well-understood: (1) exact recovery in the noiseless setting is possible if... | A Simple Compressive Sensing Algorithm for Parallel Many-Core Architectures In this paper we consider the l 1-compressive sensing problem. We propose an algorithm specifically designed to take advantage of shared memory, vectorized, parallel and many-core microprocessors such as the Cell processor, new generation Graph... | A fuzzy CBR technique for generating product ideas This paper presents a fuzzy CBR (case-based reasoning) technique for generating new product ideas from a product database for enhancing the functions of a given product (called the baseline product). In the database, a product is modeled by a 100-attribute vector, 87 o... | The laws of large numbers for fuzzy random variables The new attempt of weak and strong law of large numbers for fuzzy random variables is discussed in this paper by proposing the convergence in probability and convergence with probability one for fuzzy random variables. We first consider the limit properties of fuzzy ... | 1.1 | 0.05 | 0.033333 | 0.02 | 0.008696 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Exploring Strategies for Training Deep Neural Networks Deep multi-layer neural networks have many levels of non-linearities allowing them to compactly represent highly non-linear and highly-varying functions. However, until recently it was not clear how to train such deep networks, since gradient-based optimization sta... | Towards situated speech understanding: visual context priming of language models Fuse is a situated spoken language understanding system that uses visual context to steer the interpretation of speech. Given a visual scene and a spoken description, the system finds the object in the scene that best fits the meaning of t... | Embodied Language Understanding with a Multiple Timescale Recurrent Neural Network How the human brain understands natural language and what we can learn for intelligent systems is open research. Recently, researchers claimed that language is embodied in most if not all sensory and sensorimotor modalities and that ... | The hierarchical and functional connectivity of higher-order cognitive mechanisms: neurorobotic model to investigate the stability and flexibility of working memory. Higher-order cognitive mechanisms (HOCM), such as planning, cognitive branching, switching, etc., are known to be the outcomes of a unique neural organiza... | Compressed Sensing with Coherent and Redundant Dictionaries This article presents novel results concerning the recovery of signals from undersampled data in the common situation where such signals are not sparse in an orthonormal basis or incoherent dictionary, but in a truly redundant dictionary. This work thus bridge... | Compressed Sensing. Suppose x is an unknown vector in Ropfm (a digital image or signal); we plan to measure n general linear functionals of x and then reconstruct. If x is known to be compressible by transform coding with a known transform, and we reconstruct via the nonlinear procedure defined here, the number of meas... | An optimal algorithm for approximate nearest neighbor searching fixed dimensions Consider a set of S of n data points in real d-dimensional space, Rd, where distances are measured using any Minkowski metric. In nearest neighbor searching, we preprocess S into a data structure, so that given any query point q ∈ Rd, is t... | Asymptotic Sampling Distribution for Polynomial Chaos Representation from Data: A Maximum Entropy and Fisher Information Approach A procedure is presented for characterizing the asymptotic sampling distribution of estimators of the polynomial chaos (PC) coefficients of a second-order nonstationary and non-Gaussian rand... | On the Smolyak Cubature Error for Analytic Functions this paper, the author has been informed that Gerstner andGriebel [4] rediscovered this method. For algorithmic details, we refer to theirpaper. The resulting Smolyak cubature formulae are denoted by Q | SOS: The MOS is not enough! When it comes to analysis and interpretation of the results of subjective QoE studies, one often witnesses a lack of attention to the diversity in subjective user ratings. In extreme cases, solely Mean Opinion Scores (MOS) are reported, causing the loss of important information on the user r... | Fuzzy Logic and the Resolution Principle The relationship between fuzzy logic and two-valued logic in the context of the first order predicate calctflus is discussed. It is proved that if every clause in a set of clauses is somethblg more than a "half-truth" and the most reliable clause has truth-value a and the most u... | Machine Understanding of Natural Language | Rapid method to account for process variation in full-chip capacitance extraction Full-chip capacitance extraction programs based on lookup techniques, such as HILEX/CUP , can be enhanced to rigorously account for process variations in the dimensions of very large scale integration interconnect wires with only modest a... | Construction of interval-valued fuzzy entropy invariant by translations and scalings In this paper, we propose a method to construct interval-valued fuzzy entropies (Burillo and Bustince 1996). This method uses special aggregation functions applied to interval-contrasts. In this way, we are able to construct interval-v... | 1.076132 | 0.052625 | 0.052625 | 0.052625 | 0.014286 | 0.000201 | 0.000011 | 0.000004 | 0 | 0 | 0 | 0 | 0 | 0 |
Matchings and transversals in hypergraphs, domination and independence-in trees A family of hypergraphs is exhibited which have the property that the minimum cardinality of a transversal is equal to the maximum cardinality of a matching. A result concerning domination and independence in trees which generalises a recen... | Domination in intersecting hypergraphs. A matching in a hypergraph H is a set of pairwise disjoint hyperedges. The matching number α′(H) of H is the size of a maximum matching in H. A subset D of vertices of H is a dominating set of H if for every v∈V∖D there exists u∈D such that u andv lie in a hyperedge of H. The car... | Linear hypergraphs with large transversal number and maximum degree two For k=2, let H be a k-uniform hypergraph on n vertices and m edges. The transversal number @t(H) of H is the minimum number of vertices that intersect every edge. Chvatal and McDiarmid [V. Chvatal, C. McDiarmid, Small transversals in hypergraphs, C... | Matching and domination numbers in r-uniform hypergraphs. A matching is a set of pairwise disjoint hyperedges of a hypergraph H. The matching number $$\\nu (H)$$ź(H) of H is the maximum cardinality of a matching. A subset D of vertices of H is called a dominating set of H if for every vertex v not in D there exists $$u... | Equality of domination and transversal numbers in hypergraphs A subset S of the vertex set of a hypergraph H is called a dominating set of H if for every vertex v not in S there exists u@?S such that u and v are contained in an edge in H. The minimum cardinality of a dominating set in H is called the domination number ... | Small transversals in hypergraphs For each positive integerk, we consider the setAk of all ordered pairs [a, b] such that in everyk-graph withn vertices andm edges some set of at mostam+bn vertices meets all the edges. We show that eachAk withk=2 has infinitely many extreme points and conjecture that, for every positiv... | Independent systems of representatives in weighted graphs The following conjecture may have never been explicitly stated, but seems to have been floating around: if the vertex set of a graph with maximal degree Δ is partitioned into sets V i of size 2Δ, then there exists a coloring of the graph by 2Δ colors, where each... | Learning and classification of monotonic ordinal concepts | Proactive secret sharing or: How to cope with perpetual leakage Secret sharing schemes protect secrets by distributing them over different locations (share holders). In particular, in k out of n threshold schemes, security is assured if throughout the entire life-time of the secret the adversary is restricted to compro... | Criticality computation in parameterized statistical timing Chips manufactured in 90 nm technology have shown large parametric variations, and a worsening trend is predicted. These parametric variations make circuit optimization difficult since different paths are frequency-limiting in different parts of the multi-dime... | Mono-multi bipartite Ramsey numbers, designs, and matrices Eroh and Oellermann defined BRR(G1, G2) as the smallest N such that any edge coloring of the complete bipartite graph KN, N contains either a monochromatic G1 or a multicolored G2. We restate the problem of determining BRR(K1,λ, Kr,s) in matrix form and prove e... | Hierarchical statistical characterization of mixed-signal circuits using behavioral modeling A methodology for hierarchical statistical circuit characterization which does not rely upon circuit-level Monte Carlo simulation is presented. The methodology uses principal component analysis, response surface methodology, an... | Spectral Methods for Parameterized Matrix Equations. We apply polynomial approximation methods-known in the numerical PDEs context as spectral methods-to approximate the vector-valued function that satisfies a linear system of equations where the matrix and the right-hand side depend on a parameter. We derive both an i... | On Fuzziness, Its Homeland and Its Neighbour | 1.072767 | 0.066667 | 0.051081 | 0.051081 | 0.031688 | 0.006789 | 0.000025 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Sparsity preserving projections with applications to face recognition Dimensionality reduction methods (DRs) have commonly been used as a principled way to understand the high-dimensional data such as face images. In this paper, we propose a new unsupervised DR method called sparsity preserving projections (SPP). Unlik... | Beyond sparsity: The role of L1-optimizer in pattern classification The newly-emerging sparse representation-based classifier (SRC) shows great potential for pattern classification but lacks theoretical justification. This paper gives an insight into SRC and seeks reasonable supports for its effectiveness. SRC uses L"1... | Convergence of Fixed-Point Continuation Algorithms for Matrix Rank Minimization The matrix rank minimization problem has applications in many fields, such as system identification, optimal control, low-dimensional embedding, etc. As this problem is NP-hard in general, its convex relaxation, the nuclear norm minimizatio... | Sparse Representation for Computer Vision and Pattern Recognition Techniques from sparse signal representation are beginning to see significant impact in computer vision, often on nontraditional applications where the goal is not just to obtain a compact high-fidelity representation of the observed signal, but also to ... | Quantization of Sparse Representations Compressive sensing (CS) is a new signal acquisition technique for sparse and com- pressible signals. Rather than uniformly sampling the signal, CS computes inner products with randomized basis functions; the signal is then recovered by a convex optimization. Random CS measurement... | Subspace pursuit for compressive sensing signal reconstruction We propose a new method for reconstruction of sparse signals with and without noisy perturbations, termed the subspace pursuit algorithm. The algorithm has two important characteristics: low computational complexity, comparable to that of orthogonal matchin... | Sparse representation for color image restoration. Sparse representations of signals have drawn considerable interest in recent years. The assumption that natural signals, such as images, admit a sparse decomposition over a redundant dictionary leads to efficient algorithms for handling such sources of data. In particu... | Sets with type-2 operations The algebra of truth values of type-2 fuzzy sets consists of all mappings of the unit interval to itself, with type-2 operations that are convolutions of ordinary max and min operations. This paper is concerned with a special subalgebra of this truth value algebra, namely the set of nonzero ... | Fuzzy connection admission control for ATM networks based on possibility distribution of cell loss ratio This paper proposes a connection admission control (CAC) method for asynchronous transfer mode (ATM) networks based on the possibility distribution of cell loss ratio (CLR). The possibility distribution is estimated... | Incremental criticality and yield gradients Criticality and yield gradients are two crucial diagnostic metrics obtained from Statistical Static Timing Analysis (SSTA). They provide valuable information to guide timing optimization and timing-driven physical synthesis. Existing work in the literature, however, computes ... | Fast image recovery using variable splitting and constrained optimization We propose a new fast algorithm for solving one of the standard formulations of image restoration and reconstruction which consists of an unconstrained optimization problem where the objective includes an l2 data-fidelity term and a nonsmooth reg... | Induced uncertain linguistic OWA operators applied to group decision making The ordered weighted averaging (OWA) operator was developed by Yager [IEEE Trans. Syst., Man, Cybernet. 18 (1998) 183]. Later, Yager and Filev [IEEE Trans. Syst., Man, Cybernet.--Part B 29 (1999) 141] introduced a more general class of OWA oper... | New Type-2 Rule Ranking Indices for Designing Parsimonious Interval Type-2 Fuzzy Logic Systems In this paper, we propose two novel indices for type-2 fuzzy rule ranking to identify the most influential fuzzy rules in designing type-2 fuzzy logic systems, and name them as R-values and c-values of fuzzy rules separately.... | Designing type-2 fuzzy logic system controllers via fuzzy Lyapunov synthesis for the output regulator of a servomechanism with nonlinear backlash Fuzzy Lyapunov Synthesis is extended to the design of Type-2 Fuzzy Logic System Controllers for the output regulation problem for a servomechanism with nonlinear backlash. Th... | 1.025455 | 0.018182 | 0.009091 | 0.006727 | 0.002273 | 0.001119 | 0.000019 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Adaptive learning of linguistic hierarchy in a multiple timescale recurrent neural network Recent research has revealed that hierarchical linguistic structures can emerge in a recurrent neural network with a sufficient number of delayed context layers. As a representative of this type of network the Multiple Timescale ... | Towards situated speech understanding: visual context priming of language models Fuse is a situated spoken language understanding system that uses visual context to steer the interpretation of speech. Given a visual scene and a spoken description, the system finds the object in the scene that best fits the meaning of t... | Embodied Language Understanding with a Multiple Timescale Recurrent Neural Network How the human brain understands natural language and what we can learn for intelligent systems is open research. Recently, researchers claimed that language is embodied in most if not all sensory and sensorimotor modalities and that ... | The hierarchical and functional connectivity of higher-order cognitive mechanisms: neurorobotic model to investigate the stability and flexibility of working memory. Higher-order cognitive mechanisms (HOCM), such as planning, cognitive branching, switching, etc., are known to be the outcomes of a unique neural organiza... | Exploring Strategies for Training Deep Neural Networks Deep multi-layer neural networks have many levels of non-linearities allowing them to compactly represent highly non-linear and highly-varying functions. However, until recently it was not clear how to train such deep networks, since gradient-based optimization sta... | Anaphora for everyone: pronominal anaphora resoluation without a parser We present an algorithm for anaphora resolution which is a modified and extended version of that developed by (Lappin and Leass, 1994). In contrast to that work, our algorithm does not require in-depth, full, syntactic parsing of text. Instead, wit... | Counter braids: a novel counter architecture for per-flow measurement Fine-grained network measurement requires routers and switches to update large arrays of counters at very high link speed (e.g. 40 Gbps). A naive algorithm needs an infeasible amount of SRAM to store both the counters and a flow-to-counter associatio... | MapReduce: simplified data processing on large clusters MapReduce is a programming model and an associated implementation for processing and generating large datasets that is amenable to a broad variety of real-world tasks. Users specify the computation in terms of a map and a reduce function, and the underlying runtim... | Efficient approximation of random fields for numerical applications This article is dedicated to the rapid computation of separable expansions for the approximation of random fields. We consider approaches based on techniques from the approximation of non-local operators on the one hand and based on the pivoted Cholesk... | Recognition of shapes by attributed skeletal graphs In this paper, we propose a framework to address the problem of generic 2-D shape recognition. The aim is mainly on using the potential strength of skeleton of discrete objects in computer vision and pattern recognition where features of objects are needed for classif... | Compressive sampling for streaming signals with sparse frequency content Compressive sampling (CS) has emerged as significant signal processing framework to acquire and reconstruct sparse signals at rates significantly below the Nyquist rate. However, most of the CS development to-date has focused on finite-length sign... | QoE Aware Service Delivery in Distributed Environment Service delivery and customer satisfaction are strongly related items for a correct commercial management platform. Technical aspects targeting this issue relate to QoS parameters that can be handled by the platform, at least partially. Subjective psychological issu... | A model to perform knowledge-based temporal abstraction over multiple signals In this paper we propose the Multivariable Fuzzy Temporal Profile model (MFTP), which enables the projection of expert knowledge on a physical system over a computable description. This description may be used to perform automatic abstraction... | Fuzzy optimization of units products in mix-product selection problem using fuzzy linear programming approach In this paper, the modified S-curve membership function methodology is used in a real life industrial problem of mix product selection. This problem occurs in the production planning management where by a decis... | 1.072622 | 0.070333 | 0.070333 | 0.070333 | 0.017584 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
The Inherent Indistinguishability in Fuzzy Systems This paper provides an overview of fuzzy systems from the viewpoint of similarity relations. Similarity relations turn out to be an appealing framework in which typical concepts and techniques applied in fuzzy systems and fuzzy control can be better understood and inte... | Fuzzy homomorphisms of algebras In this paper we consider fuzzy relations compatible with algebraic operations, which are called fuzzy relational morphisms. In particular, we aim our attention to those fuzzy relational morphisms which are uniform fuzzy relations, called uniform fuzzy relational morphisms, and those whi... | Fuzzy modifiers based on fuzzy relations In this paper we introduce a new type of fuzzy modifiers (i.e. mappings that transform a fuzzy set into a modified fuzzy set) based on fuzzy relations. We show how they can be applied for the representation of weakening adverbs (more or less, roughly) and intensifying adverbs (v... | Towards a Logic for a Fuzzy Logic Controller Without Abstract | Similarity relations and fuzzy orderings. The notion of ''similarity'' as defined in this paper is essentially a generalization of the notion of equivalence. In the same vein, a fuzzy ordering is a generalization of the concept of ordering. For example, the relation x @? y (x is much larger than y) is a fuzzy linear or... | Artificial Paranoia | Processing fuzzy temporal knowledge L.A. Zadeh's (1975) possibility theory is used as a general framework for modeling temporal knowledge pervaded with imprecision or uncertainty. Ill-known dates, time intervals with fuzzy boundaries, fuzzy durations, and uncertain precedence relations between events can be dealt with ... | On the capacity of MIMO broadcast channels with partial side information In multiple-antenna broadcast channels, unlike point-to-point multiple-antenna channels, the multiuser capacity depends heavily on whether the transmitter knows the channel coefficients to each user. For instance, in a Gaussian broadcast channel w... | A 2-tuple fuzzy linguistic representation model for computing with words The fuzzy linguistic approach has been applied successfully to many problems. However, there is a limitation of this approach imposed by its information representation model and the computation methods used when fusion processes are performed on l... | Completeness and consistency conditions for learning fuzzy rules The completeness and consistency conditions were introduced in order to achieve acceptable concept recognition rules. In real problems, we can handle noise-affected examples and it is not always possible to maintain both conditions. Moreover, when we use ... | Estimation of (near) low-rank matrices with noise and high-dimensional scaling We study an instance of high-dimensional inference in which the goal is to estimate a matrix circle minus* is an element of R-m1xm2 on the basis of N noisy observations. The unknown matrix circle minus* is assumed to be either exactly low ra... | User impatience and network performance In this work, we analyze from passive measurements the correlations between the user-induced interruptions of TCP connections and different end-to-end performance metrics. The aim of this study is to assess the possibility for a network operator to take into account the customers... | Fuzzy concepts and formal methods: some illustrative examples It has been recognised that formal methods are useful as a modelling tool in requirements engineering. Specification languages such as Z permit the precise and unambiguous modelling of system properties and behaviour. However, some system problems, particula... | The laws of large numbers for fuzzy random variables The new attempt of weak and strong law of large numbers for fuzzy random variables is discussed in this paper by proposing the convergence in probability and convergence with probability one for fuzzy random variables. We first consider the limit properties of fuzzy ... | 1.249984 | 0.249984 | 0.049997 | 0.001999 | 0.000027 | 0.000001 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 3