Browsing by Title

Now showing items 4058-4077 of 4790

  • Substitutional and vacancy defects in two-dimensional AlSb: A first principle approach 

    Udofia, Benjamin Etim (2019-07-22)
    AlSb is a semiconductor material which exist in 3D as well as 2D regimes. AlSb have a high electron mobility which is useful for application in high speed electronic devices. AlSb has potential applications in radiation ...

  • Substitutional and vacancy defects in two-dimensional AlSb: A first principle approach 

    Udofia, Benjamin Etim (2019-07-23)
    AlSb is a semiconductor material which exist in 3D as well as 2D regimes. AlSb have a high electron mobility which is useful for application in high speed electronic devices. AlSb has potential applications in radiation ...

  • Sufficient Conditions for Uniform Stability of Regularization Algorithms 

    Unknown author (2009-12-01)
    In this paper, we study the stability and generalization properties of penalized empirical-risk minimization algorithms. We propose a set of properties of the penalty term that is sufficient to ensure uniform ?-stability: ...

  • Sufficientness postulates for Gibbs-type priors and hierarchical generalizations 

    Bacallado de Lara, Sergio Andres; Battiston, M; Favaro, S; Trippa, L
    A fundamental problem in Bayesian nonparametrics consists of selecting a prior distribution by assuming that the corresponding predictive probabilities obey certain properties. An early discussion of such a problem, although ...

  • Suggested Conventions for LISP Time-Sharing System 

    Unknown author (1963-04-01)
    Below is a list of suggested Conventions and De-bugging aids for LISP time-sharing. Any and all suggestions are encouraged and should be submitted in writing to R. A. Robnett in a hurry.

  • Suggestions and Advice 

    Unknown author (MIT Artificial Intelligence Laboratory, 1973-03)
    Results of scene analysis, as they are achieved, direct and advise the flow of subsequent processing.

  • Suggestions for Genetic A.I. 

    Unknown author (MIT Artificial Intelligence Laboratory, 1980-02)
    This paper presents suggestions for "Genetic A.I.": an attempt to model the genesis of intelligence in human infants, particularly as described by Piaget's theory of the Sensorimotor period. The paper includes a synopsis ...

  • Suitability of Nigerian Barites for Drilling Mud Production and Sustainability of Artisanal and Small Scale Mining (Asm) of Barites In Nigeria 

    Otoijamun, Itohan (2021-06-23)
    The aim of this dissertation is to contribute to efforts towards increasing the use of Nigerian barites in drilling mud production and other industrial applications. In order to achieve the above objectives, three projects ...

  • A Suite of Techniques for Describing Activity in Terms of Events 

    Unknown author (2015-03-30)
    This report presents a set of software techniques that support the tasks of event recognition, summarization of event sequences, explanation of recognized events, explanation of non-recognized events, prediction of event ...

  • Summarizing Qualitative Behavior from Measurements of NonlinearsCircuits 

    Unknown author (1989-05-01)
    This report describes a program which automatically characterizes the behavior of any driven, nonlinear, electrical circuit. To do this, the program autonomously selects interesting input parameters, drives the circuit, ...

  • Summary of MYCROFT: A System for Understanding Simple Picture Programs 

    Unknown author (1974-05-01)
    A collection of powerful ideas??cription, plans, linearity, insertions, global knowledge and imperative semantics?? explored which are fundamental to debugging skill. To make these concepts precise, a computer monitor ...

  • Summary of Selected Vision Topics 

    Unknown author (MIT Artificial Intelligence Laboratory, 1972-07)
    This is an introduction to some of the MIT AI vision work of the last few years. The topics discussed are 1) Waltz's work on line drawing semantics, 2) heterarchy, 3) the ancient learning business and 4) copying scenes. ...

  • Summer Vision Group: A Quick Look at Some of Our Programs 

    Unknown author (1966-07-01)
    no abstract

  • Summer Vision Programs 

    Unknown author (1966-10-01)
    We assume that we are given a square array that describes a scene. The name of the array will be "array." The number of points representing the side length of the array will be called "pts." (I.e., (pts)2 is the total ...

  • The Summer Vision Project 

    Unknown author (1966-07-01)
    The summer vision project is an attempt to use our summer workers effectively in the construction of a significant part of a visual system. The particular task was chosen partly because it can be segmented into sub-problems ...

  • The SUPDUP Protocol 

    Unknown author (1983-07-01)
    The SUPDUP protocol provides for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and ...

  • Superadditivity of private information for any number of uses of the channel 

    Elkouss, David; Strelchuk, Sergii (APSPhysical Review Letters, 2015-07-20)
    The quantum capacity of a quantum channel is always smaller than the capacity of the channel for private communication. Both quantities are given by the infinite regularization of the coherent and the private information, ...

  • The Supercomputer Toolkit and Its Applications 

    Unknown author (1990-07-01)
    The Supercomputer Toolkit is a proposed family of standard hardware and software components from which special-purpose machines can be easily configured. Using the Toolkit, a scientist or an engineer, starting with a ...

  • The Supercomputer Toolkit: A General Framework for Special-purpose Computing 

    Unknown author (1991-11-01)
    The Toolkit is a family of hardware modules (processors, memory, interconnect, and input-output devices) and a collection of software modules (compilers, simulators, scientific libraries, and high-level front ends) from ...

  • Supplement to "Distributed Quota Enforcement for Spam Control" 

    Unknown author (2006-04-29)
    This report is a supplement to our paper "Distributed Quota Enforcement forSpam Control" (NSDI 2006). We assume here that the reader has readthe main paper. In this report, we first analyze the enforcer nodes'key-value ...