Results 1 - 10
of
11,034
Discriminative Training and Maximum Entropy Models for Statistical Machine Translation
, 2002
"... We present a framework for statistical machine translation of natural languages based on direct maximum entropy models, which contains the widely used source -channel approach as a special case. All knowledge sources are treated as feature functions, which depend on the source language senten ..."
Abstract
-
Cited by 508 (30 self)
- Add to MetaCart
We present a framework for statistical machine translation of natural languages based on direct maximum entropy models, which contains the widely used source -channel approach as a special case. All knowledge sources are treated as feature functions, which depend on the source language
UPPAAL in a Nutshell
, 1997
"... . This paper presents the overall structure, the design criteria, and the main features of the tool box Uppaal. It gives a detailed user guide which describes how to use the various tools of Uppaal version 2.02 to construct abstract models of a real-time system, to simulate its dynamical behavior, ..."
Abstract
-
Cited by 662 (51 self)
- Add to MetaCart
, communicating through channels and (or) shared variables [34, 26]. Typical application areas in...
Efficient exact stochastic simulation of chemical systems with many species and many channels
- J. Phys. Chem. A
, 2000
"... There are two fundamental ways to view coupled systems of chemical equations: as continuous, represented by differential equations whose variables are concentrations, or as discrete, represented by stochastic processes whose variables are numbers of molecules. Although the former is by far more comm ..."
Abstract
-
Cited by 427 (5 self)
- Add to MetaCart
There are two fundamental ways to view coupled systems of chemical equations: as continuous, represented by differential equations whose variables are concentrations, or as discrete, represented by stochastic processes whose variables are numbers of molecules. Although the former is by far more
Secret Key Agreement by Public Discussion From Common Information
- IEEE Transactions on Information Theory
, 1993
"... . The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y , respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution PX ..."
Abstract
-
Cited by 434 (18 self)
- Add to MetaCart
. The problem of generating a shared secret key S by two parties knowing dependent random variables X and Y , respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable Z, jointly distributed with X and Y according to some probability distribution
Turbulence statistics in fully developed channel flow at low Reynolds number
- J. Fluid Mech
, 1987
"... A direct numerical simulation of a turbulent channel flow is performed. The unsteady Navier-Stokes equations are solved numerically at a Reynolds number of 3300, based on thc mean centreline velocity and channel half-width, with about 4 x los grid points (192 x 129 x 160 in 2, y, 2). All essential t ..."
Abstract
-
Cited by 395 (14 self)
- Add to MetaCart
A direct numerical simulation of a turbulent channel flow is performed. The unsteady Navier-Stokes equations are solved numerically at a Reynolds number of 3300, based on thc mean centreline velocity and channel half-width, with about 4 x los grid points (192 x 129 x 160 in 2, y, 2). All essential
Recursive Distributed Representations
- Artificial Intelligence
, 1990
"... A long-standing difficulty for connectionist modeling has been how to represent variable-sized recursive data structures, such as trees and lists, in fixed-width patterns. This paper presents a connectionist architecture which automatically develops compact distributed representations for such compo ..."
Abstract
-
Cited by 414 (9 self)
- Add to MetaCart
A long-standing difficulty for connectionist modeling has been how to represent variable-sized recursive data structures, such as trees and lists, in fixed-width patterns. This paper presents a connectionist architecture which automatically develops compact distributed representations
Economic Shocks and Civil Conflict: An Instrumental Variables Approach
- Journal of Political Economy
, 2004
"... Estimating the impact of economic conditions on the likelihood of civil conflict is difficult because of endogeneity and omitted variable bias. We use rainfall variation as an instrumental variable for economic growth in 41 African countries during 1981–99. Growth is strongly negatively related to c ..."
Abstract
-
Cited by 353 (13 self)
- Add to MetaCart
Estimating the impact of economic conditions on the likelihood of civil conflict is difficult because of endogeneity and omitted variable bias. We use rainfall variation as an instrumental variable for economic growth in 41 African countries during 1981–99. Growth is strongly negatively related
Does Financial Liberalization Spur Growth
- Journal of Financial Economics
, 2005
"... We show that equity market liberalizations, on average, lead to a one percent increase in annual real economic growth over a five-year period. The effect is robust to alternative definitions of liberalization and does not reflect a business cycle effect. The channel of growth is both increased inves ..."
Abstract
-
Cited by 389 (8 self)
- Add to MetaCart
We show that equity market liberalizations, on average, lead to a one percent increase in annual real economic growth over a five-year period. The effect is robust to alternative definitions of liberalization and does not reflect a business cycle effect. The channel of growth is both increased
Open-Economy Inflation Targeting
, 1998
"... The paper extends previous analysis of closed-economy inflation targeting to a small open economy with forward-looking aggregate supply and demand with some microfoundations, and with stylized realistic lags in the different transmission channels for monetary policy. The paper compares targeting of ..."
Abstract
-
Cited by 370 (7 self)
- Add to MetaCart
The paper extends previous analysis of closed-economy inflation targeting to a small open economy with forward-looking aggregate supply and demand with some microfoundations, and with stylized realistic lags in the different transmission channels for monetary policy. The paper compares targeting
Generalized privacy amplification
- IEEE Transactions on Information Theory
, 1995
"... Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about which ..."
Abstract
-
Cited by 325 (19 self)
- Add to MetaCart
Abstract- This paper provides a general treatment of pri-vacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distill a secret key from a common random variable about
Results 1 - 10
of
11,034