Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
8
views
56
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,096
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Developments in Language Theory: 22nd International Conference, DLT 2018, Tokyo, Japan, September 10-14, 2018, Proceedings
A Tale of Conjunctive Grammars
other
Author(s):
Alexander Okhotin
Publication date
(Online):
August 05 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
56
Record
: found
Abstract
: not found
Article
: not found
On the translation of languages from left to right
Donald Knuth
(1965)
0
comments
Cited
46
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
General context-free recognition in less than cubic time
Leslie Valiant
(1975)
0
comments
Cited
29
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A New Normal-Form Theorem for Context-Free Phrase Structure Grammars
Sheila Greibach
(1965)
0
comments
Cited
25
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
August 05 2018
Pages
: 36-59
DOI:
10.1007/978-3-319-98654-8_4
SO-VID:
1ce363ef-8558-495d-ab2a-61d6158717fd
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Tools and Techniques for Applications in 5G Networks and Beyond
pp. 1
Proof-of-Work Certificates that Can Be Efficiently Computed in the Cloud (Invited Talk)
pp. 1
Block Sorting-Based Transformations on Words: Beyond the Magic BWT
pp. 3
Cellular Automata Model for Proteomics and Its Application in Cancer Immunotherapy
pp. 3
Practical Experience Report: Automotive Safety Practices vs. Accepted Principles
pp. 3
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs
pp. 5
Research on the Classification of the Relationships Among the Same Layer Elements in Assurance Case Structure for Evaluation
pp. 9
Evaluation of a Simulated Distributed Sensor- and Computational Network for Numerical Prediction Calculations
pp. 12
A Generic Method for a Bottom-Up ASIL Decomposition
pp. 14
Continuous Argument Engineering: Tackling Uncertainty in Machine Learning Based Systems
pp. 16
Modeling Spatio-Temporal Dynamics of Metabolic Networks with Cellular Automata and Constraint-Based Methods
pp. 18
On Unimodular Matrices of Difference Operators
pp. 18
The Runs Theorem and Beyond
pp. 21
Estimation of a Heavy-Tailed Weibull-Pareto Distribution and Its Application to QoE Modeling
pp. 22
The Assurance Recipe: Facilitating Assurance Patterns
pp. 24
A Brief Excursion to Parity Games
pp. 25
Secure Code Execution: A Generic PUF-Driven System Architecture
pp. 27
Assurance Benefits of ISO 26262 Compliant Microcontrollers for Safety-Critical Avionics
pp. 30
A Novel Cellular Automata Modelling Framework for Micro-environmental Interaction and Co-invasion
pp. 31
Incorporating Attacks Modeling into Safety Process
pp. 31
Communication Capabilities of Wireless M-BUS: Remote Metering Within SmartGrid Infrastructure
pp. 32
Sparse Polynomial Arithmetic with the BPAS Library
pp. 36
A Tale of Conjunctive Grammars
pp. 42
Assurance Case Considerations for Interoperable Medical Systems
pp. 42
PAM: Discrete 3-D Model of Tumor Dynamics in the Presence of Anti-tumor Treatment
pp. 43
On a Queueing System with Processing of Service Items Under Vacation and N-policy
pp. 45
Structuring Validation Targets of a Machine Learning Function Applied to Automated Driving
pp. 47
Lumus: Dynamically Uncovering Evasive Android Applications
pp. 49
Two Decades of Assurance Case Tools: A Survey
pp. 51
Computation of Pommaret Bases Using Syzygies
pp. 57
Modeling of Electrical and Thermal Behaviors of Photovoltaic Panels Using Cellular Automata Approach
pp. 58
Flying Network for Emergencies
pp. 59
Multi-aspect Safety Engineering for Highly Automated Driving
pp. 60
MMINT-A: A Tool for Automated Change Impact Assessment on Assurance Cases
pp. 60
Groups, Languages and Dendric Shifts
pp. 67
A Strongly Consistent Finite Difference Scheme for Steady Stokes Flow and its Modified Equations
pp. 67
ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software
pp. 68
Hidden Costs of Modelling Post-fire Plant Community Assembly Using Cellular Automata
pp. 71
Statistical Clustering of a Random Network by Extremal Properties
pp. 71
D-Case Steps: New Steps for Writing Assurance Cases
pp. 73
A Model-Based Safety Analysis of Dependencies Across Abstraction Layers
pp. 74
Some Open Problems in Polyomino Tilings
pp. 80
Hardware Implementation of a Biomimicking Hybrid CA
pp. 82
Symbolic-Numeric Methods for Nonlinear Integro-Differential Modeling
pp. 83
On Proximity-Based Information Delivery
pp. 83
Weak Cost Register Automata Are Still Powerful
pp. 85
How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification
pp. 87
A Testbed for Trusted Telecommunications Systems in a Safety Critical Environment
pp. 91
Formal Verification of Signalling Programs with SafeCap
pp. 92
Potential Oscillations in Cellular Automaton Based Model for Passivation of Metal Surface
pp. 95
Enabling M2M Communication Through MEC and SDN
pp. 96
From Two-Way Transducers to Regular Function Expressions
pp. 99
Constraint-Based Testing for Buffer Overflows
pp. 99
A Continuation Method for Visualizing Planar Real Algebraic Curves with Singularities
pp. 101
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy
pp. 102
Motion Detection and Characterization in Videos with Cellular Automata
pp. 106
Queuing Management with Feedback in Cloud Computing Centers with Large Numbers of Web Servers
pp. 107
Deriving and Formalising Safety and Security Requirements for Control Systems
pp. 109
Decidability of Right One-Way Jumping Finite Automata
pp. 112
Multi-layered Approach to Safe Navigation of Swarms of Drones
pp. 115
Coexistence in Three-Species Cyclic Competition: Lattice-Based Versus Lattice-Free Individual-Based Models
pp. 116
From Exponential Analysis to Padé Approximation and Tensor Decomposition, in One and More Dimensions
pp. 116
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP
pp. 120
The Time-Out Length Influence on the Available Bandwidth of the Selective Failure Mode of Transport Protocol in the Load Data Transmission Path
pp. 121
Additive Number Theory via Approximation by Regular Languages
pp. 123
Optimal Test Suite Generation for Modified Condition Decision Coverage Using SAT Solving
pp. 125
Towards Self-organizing Sensor Networks: Game-Theoretic $$\epsilon $$ -Learning Automata-Based Approach
pp. 131
Symbolic Algorithm for Generating the Orthonormal Bargmann–Moshinsky Basis for $$\mathrm {SU(3)}$$ Group
pp. 132
ICT-Based Beekeeping Using IoT and Machine Learning
pp. 132
Linear Cryptanalysis of Reduced-Round Speck with a Heuristic Approach: Automatic Search for Linear Trails
pp. 133
Tree-to-Graph Transductions with Scope
pp. 137
Termination and Stability Levels in Evolved CA Agents for the Black–Pattern Task
pp. 139
Towards (Semi-)Automated Synthesis of Runtime Safety Models: A Safety-Oriented Design Approach for Service Architectures of Cooperative Autonomous Systems
pp. 139
Efficient Splitting of Test and Simulation Cases for the Verification of Highly Automated Driving Functions
pp. 144
MAP/PH/1 Retrial Queue with Abandonment, Flush Out and Search of Customers
pp. 145
A Characterization of Completely Reachable Automata
pp. 146
Size Effect in Cellular Automata Based Disease Spreading Model
pp. 146
About Some Drinfel’d Associators
pp. 151
Co-Engineering-in-the-Loop
pp. 151
Conditional Cube Searching and Applications on Trivium-Variant Ciphers
pp. 154
Pheromone Interactions in a Cellular Automata-Based Model for Surveillance Robots
pp. 156
Inequalities for One-Step Products
pp. 157
Risk Overbounding for a Linear Model
pp. 157
Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry
pp. 164
On a Polytime Factorization Algorithm for Multilinear Polynomials over $$\mathbb {F}_2$$
pp. 166
Agent-Based Simulation of Information Spreading in VANET
pp. 169
On the Commutative Equivalence of Context-Free Languages
pp. 170
Analysis of Resource Sharing Between MBB and MTC Sessions with Data Aggregation Using Matrix-Analytic Methods and Simulation
pp. 171
Practical Attacks on Relational Databases Protected via Searchable Encryption
pp. 172
Safe and Secure Automotive Over-the-Air Updates
pp. 177
A Quantitative Approach for the Likelihood of Exploits of System Vulnerabilities
pp. 177
Analysis of Rates of Agents’ Decisions in Learning to Cross a Highway in Populations with Risk Takers and Risk Avoiders
pp. 177
Tropical Newton–Puiseux Polynomials
pp. 182
Simon’s Theorem for Scattered Words
pp. 184
Efficiency Enhancement of Tethered High Altitude Communication Platforms Based on Their Hardware-Software Unification
pp. 185
The Automatic Generation of an Efficient Floor Field for CA Simulations in Crowd Management
pp. 187
Orthogonal Tropical Linear Prevarieties
pp. 188
Dependability Analysis of the AFDX Frame Management Design
pp. 190
Safety and Security in a Smart Production Environment
pp. 192
A Simple Algorithm for Estimating Distribution Parameters from $$n$$ n -Dimensional Randomized Binary Responses
pp. 194
The Synchronizing Probability Function for Primitive Sets of Matrices
pp. 196
Traffic on Small Grids and the Ramp Problem
pp. 197
Symbolic-Numerical Algorithms for Solving Elliptic Boundary-Value Problems Using Multivariate Simplex Lagrange Elements
pp. 201
On Cyber-Security of Information Systems
pp. 202
Survey of Scenarios for Measurement of Reliable Wireless Communication in 5G
pp. 205
Efficient On-Line Error Detection and Mitigation for Deep Neural Network Accelerators
pp. 206
Recognizability for Automata
pp. 207
The Impact of Different Angle Paths on Discrete-Continuous Pedestrian Dynamics Model
pp. 212
Inventory Management System with Two-Switch Synchronous Control
pp. 213
Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection
pp. 214
Symbolic-Numeric Simulation of Satellite Dynamics with Aerodynamic Attitude Control System
pp. 214
Application of IEC 62443 for IoT Components
pp. 218
Two-Way Road Cellular Automaton Model with Loading/Unloading Bays for Traffic Flow Simulation
pp. 219
Site-Directed Deletion
pp. 220
Random Additive Control Flow Error Detection
pp. 224
A Retrial Queueing System with Multiple Hierarchial Orbits and Orbital Search
pp. 224
Dependable Outlier Detection in Harsh Environments Monitoring Systems
pp. 230
A Microscopic CA Model of Traffic Flow?
pp. 230
Finding Multiple Solutions in Nonlinear Integer Programming with Algebraic Test-Sets
pp. 231
Counting Subwords and Regular Languages
pp. 231
Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices
pp. 234
On Sensitivity Analysis of Steady State Probabilities of Double Redundant Renewable System with Marshall-Olkin Failure Model
pp. 235
Fault-Tolerant Clock Synchronization with Only Two Redundant Paths
pp. 238
Positive Solutions of Systems of Signed Parametric Polynomial Inequalities
pp. 239
Fault Trees vs. Component Fault Trees: An Empirical Study
pp. 243
Deque Languages, Automata and Planar Graphs
pp. 243
Regional Control of Probabilistic Cellular Automata
pp. 246
Data Reclassification of Multidimensional Information System Designed Using Cluster Method of Metadata Description
pp. 250
Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
pp. 250
MORE: MOdel-based REdundancy for Simulink
pp. 252
Challenges in Assuring Highly Complex, High Volume Safety-Critical Software
pp. 254
Qualitative Analysis of a Dynamical System with Irrational First Integrals
pp. 255
Regional Synchronization of a Probabilistic Cellular Automaton
pp. 256
A General Approach to State Complexity of Operations: Formalization and Limitations
pp. 257
Method for Adaptive Node Clustering in AD HOC Wireless Sensor Networks
pp. 264
The Model and Algorithms for Estimation the Performance Measures of Access Node Serving the Mixture of Real Time and Elastic Data
pp. 264
Firsts Steps in Cellular Fields Optimization: A FSSP Case Study
pp. 265
Comparing Risk Identification in Hazard Analysis and Threat Analysis
pp. 267
Diversity in Open Source Intrusion Detection Systems
pp. 268
Offline Assisted Group Key Exchange
pp. 269
On Matching Generalised Repetitive Patterns
pp. 272
Effective Localization Using Double Ideal Quotient and Its Implementation
pp. 274
Implementations of FSSP Algorithms on Fault-Tolerant Cellular Arrays
pp. 276
Unreliable Single-Server Queue with Two-Way Communication and Retrials of Blocked and Interrupted Calls for Cognitive Radio Networks
pp. 278
Towards Risk Estimation in Automated Vehicles Using Fuzzy Logic
pp. 282
Inter-device Sensor-Fusion for Action Authorization on Industrial Mobile Robots
pp. 282
Intersection Non-emptiness and Hardness Within Polynomial Time
pp. 288
A Purely Functional Computer Algebra System Embedded in Haskell
pp. 288
Some Aspects of the Discrete Geo/G/1 Type Cyclic Waiting Systems
pp. 289
Do There Exist Non-linear Maximal Length Cellular Automata? A Study
pp. 289
Function-Dependent Commitments for Verifiable Multi-party Computation
pp. 290
Integration Analysis of a Transmission Unit for Automated Driving Vehicles
pp. 291
Complexity of Decision Problems on Totally Rigid Acyclic Tree Grammars
pp. 297
Towards a Common Ontology of Safety Risk Concepts for Railway Vehicles and Signaling
pp. 298
Polynomial Equations over Finite, Discrete-Time Dynamical Systems
pp. 302
A Retrial Queueing System with Alternating Inter-retrial Time Distribution
pp. 302
In Search of Synergies in a Multi-concern Development Lifecycle: Safety and Cybersecurity
pp. 304
Splitting Permutation Representations of Finite Groups by Polynomial Algebra Methods
pp. 304
A Pattern Logic for Automata with Outputs
pp. 307
The Representation Role for Basic Operations Embodied in Cellular Automata: A Suitability Example for Addition in Redundant Numeral Systems vs Conventional Ones
pp. 308
On Constructing Pairing-Free Identity-Based Encryptions
pp. 316
Implementation of Unlimited Anticollision for RFID System by Multilateration Method
pp. 318
The Intersection Problem for Finite Semigroups
pp. 319
Quantum Walks on Quantum Cellular Automata Lattices: Towards a New Model for Quantum Computation
pp. 319
Counter Attacks for Bus-off Attacks
pp. 319
Factoring Multivariate Polynomials with Many Factors and Huge Coefficients
pp. 327
Characteristics of Lost and Served Packets for Retrial Queueing System with General Renovation and Recurrent Input Flow
pp. 328
Multi-key Homomorphic Proxy Re-Encryption
pp. 328
Fractal Arrangement for 2D Cellular Automata and Its Implementation for Outer-Totalistic Rules
pp. 330
On Completely Reachable Automata and Subset Reachability
pp. 331
Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers
pp. 335
Beyond the First Class of Analytic Complexity
pp. 340
Self-verifying Cellular Automata
pp. 341
Using Predictive Monitoring Models in Cloud Computing Systems
pp. 342
On Minimal Grammar Problems for Finite Languages
pp. 344
Towards an Integrated Penetration Testing Environment for the CAN Protocol
pp. 345
A Theory and an Algorithm for Computing Sparse Multivariate Polynomial Remainder Sequence
pp. 347
Verifiable Decryption for Fully Homomorphic Encryption
pp. 352
CARPenter: A Cellular Automata Based Resilient Pentavalent Stream Cipher
pp. 353
A Functional Approach to Estimation of the Parameters of Generalized Negative Binomial and Gamma Distributions
pp. 354
Reversible Pushdown Transducers
pp. 361
A Blackbox Polynomial System Solver on Parallel Shared Memory Computers
pp. 364
Inversion of Mutually Orthogonal Cellular Automata
pp. 365
A Security Analysis of the ETSI ITS Vehicular Communications
pp. 365
Reliability of a Discrete-Time System with Investment
pp. 366
Two-Way Automata and One-Tape Machines
pp. 369
Platform-Independent Secure Blockchain-Based Voting System
pp. 374
Real-Time Driver Behaviour Characterization Through Rule-Based Machine Learning
pp. 377
Model of Next-Generation Optical Switching System
pp. 379
Dynamics of the Independence Number and Automata Synchronization
pp. 379
Eroders and Proliferation: Repairing that Goes Wrong
pp. 385
A Pedagogical Example: A Family of Stochastic Cellular Automata that Plays Alesia
pp. 387
On Some Properties of Smoothly Irregular Waveguide Structures Critical for Information Optical Systems
pp. 387
Privacy in Crowdsourcing: A Systematic Review
pp. 392
Closest Substring Problems for Regular Languages
pp. 396
On Fixable Families of Boolean Networks
pp. 399
Stability of a Two-Pool N-Model with Preemptive-Resume Priority
pp. 404
Computational Complexity of Decision Problems on Self-verifying Finite Automata
pp. 406
Fast-Parallel Algorithms for Freezing Totalistic Asynchronous Cellular Automata
pp. 406
Mitigation of Policy Manipulation Attacks on Deep Q-Networks with Parameter-Space Noise
pp. 410
Myopic Channel Switching Strategies for Stationary Mode: Threshold Calculation Algorithms
pp. 416
Generalizations of Checking Stack Automata: Characterizations and Hierarchies
pp. 416
Stochastic Stability in Schelling’s Segregation Model with Markovian Asynchronous Update
pp. 418
What Is Acceptably Safe for Reinforcement Learning?
pp. 421
A Novel Slice-Oriented Network Model
pp. 422
Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions
pp. 428
Cellular Automata Pseudo-Random Number Generators and Their Resistance to Asynchrony
pp. 429
On Counting Functions of Languages
pp. 431
Uncertainty in Machine Learning Applications: A Practice-Driven Classification of Uncertainty
pp. 432
Reliability of the Information System with Intermediate Storage Devices
pp. 441
Towards Exact State Complexity Bounds for Input-Driven Pushdown Automata
pp. 441
Drivers’ Behavior Effects in the Occurrence of Dangerous Situations Which May Lead to Accidents
pp. 442
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation
pp. 445
Cluster-Based Energy Consumption Forecasting in Smart Grids
pp. 451
Cellular Automata Based Modeling of Competitive Evacuation
pp. 453
On Abelian Subshifts
pp. 457
A Review of Metric Analysis Applications to the Problems of Interpolating, Filtering and Predicting the Values of Onevariable and Multivariable Functions
pp. 458
Uncertainty in Machine Learning: A Safety Perspective on Autonomous Driving
pp. 460
Simulating Pedestrian Dynamics in Corners and Bends: A Floor Field Approach
pp. 463
Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic
pp. 465
Considerations of Artificial Intelligence Safety Engineering for Unmanned Aircraft
pp. 465
Reachability Problems in Nondeterministic Polynomial Maps on the Integers
pp. 469
The Application of Helmholtz Decomposition Method to Investigation of Multicore Fibers and Their Application in Next-Generation Communications Systems
pp. 470
Study on the Efficacy of Crowd Control and Information Provision Through a Simple Cellular Automata Model
pp. 473
Could We Issue Driving Licenses to Autonomous Vehicles?
pp. 478
Projection for Büchi Tree Automata with Constraints Between Siblings
pp. 481
On-the-Fly Multiple Sources Data Analysis in AR-Based Decision Support Systems
pp. 481
Cumulative Mean Crowding and Pedestrian Crowds: A Cellular Automata Model
pp. 481
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
pp. 487
The Moral Responsibility Gap and the Increasing Autonomy of Systems
pp. 491
The Computational Power of Parsing Expression Grammars
pp. 492
Cellular Automata Based Evacuation Process Triggered by Indoors Wi-Fi and GPS Established Detection
pp. 493
Retrial Queue M/M/N with Impatient Customer in the Orbit
pp. 494
Design Requirements for a Moral Machine for Autonomous Weapons
pp. 502
Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment
pp. 503
Parallel Implementations of Cellular Automata for Traffic Models
pp. 503
On Finitely Ambiguous Büchi Automata
pp. 505
On a Problem of Base Stations Optimal Placement in Wireless Networks with Linear Topology
pp. 507
AI Safety and Reproducibility: Establishing Robust Foundations for the Neuropsychology of Human Values
pp. 513
A Psychopathological Approach to Safety Engineering in AI and AGI
pp. 513
Holonification of Road Traffic Based on Graph Theory
pp. 514
Analysis of the Possibilities of Using the Means of Tropospheric cm-Wave Radio Communication with a Time Division Duplex in Telecommunication Systems
pp. 516
Uniformization Problem for Variants of First Order Logic over Finite Words
pp. 521
Why Bad Coffee? Explaining Agent Plans with Valuings
pp. 525
The Recognition of the Output Function of a Finite Automaton with Random Input
pp. 529
On Deterministic Ordered Restart-Delete Automata
pp. 532
Issues in the Software Implementation of Stochastic Numerical Runge–Kutta
pp. 535
Dynamic Risk Assessment for Vehicles of Higher Automation Levels by Deep Learning
pp. 541
Complementation of Finitely Ambiguous Büchi Automata
pp. 547
Automatic Recognition of a Weakly Identified Animal Activity State Based on Data Transformation of 3D Acceleration Sensor
pp. 548
Improving Image Classification Robustness Using Predictive Data Augmentation
pp. 553
A Structural Lemma for Deterministic Context-Free Languages
pp. 561
Principles of Construction of Mobile and Stationary Tethered High-Altitude Unmanned Telecommunication Platforms of Long-Term Operation
pp. 570
Reliability of Two Communication Channels in a Random Environment
pp. 577
Self Rising Tri Layers MLP for Time Series Forecasting
Similar content
4,096
Complex event recognition meets hierarchical conjunctive queries
Authors:
Dante Pinto
,
Cristian Riveros
Gradient Exceptionality in Maximum Entropy Grammar with Lexically Specific Constraints
Authors:
Claire Moore-Cantwell
,
Joe Pater
The interface between student teacher grammar cognitions and learner-oriented cognitions
Authors:
J. Graus
,
P. COPPEN
,
JOHAN GRAUS
…
See all similar