Parser generators designed for imperative programming languages (C++, Java, etc), such as YACC and CUPS, inevitably run into difficulty handling inherited attributes. In the past, this difficulty has been handled in one ...
In this paper, we discuss the algorithm for computing the transitive closure of a directed, acyclic graph of bounded degree given in Yangjun Chen’s paper, "A New Algorithm for Transitive Closures and Computation of Recursion ...
This paper illustrates a general overview of augmented reality, a type of technology that incorporates virtual reality and video images into one image. A subset of computer graphics, augmented reality is becoming more ...
The topic I am investigating is High Performance Computing. I am investigating the factors affecting the outcome of speed of tiled dense array programs. The significance and applications of parallel computing are countless.
As ...
This paper presents some of the encoding methods necessary to transform a PCM wave audio file into a recognizable MPEG Layer III (MP3) file, as defined by the International Standards Organization (ISO). It focuses on the ...
This paper is a survey of the algorithms that power recommender systems. To start, the social and monetary relevance of recommender systems is outlined. Then we delve into the specifics of how the first recommender system, ...
This paper will introduce and formalize the problem of generating 16th-century Fuxian counterpoint using search algorithms. Several algorithms will be analyzed with respect to the problem domain, and the advantages of ...
Cis-Regulatory Modules (CRMs) are the portion of DNA that initiates
gene expression. Gene expression is the process through which the body turns DNA into functions and cells within an organism. In this paper I build upon ...
In this thesis I will look at some simple Language Modeling techniques used in attacks on primitive encryption systems. My thesis will focus on
two Markov models for English. I use the simpler of these models to implement ...
To achieve improved real-time performance, hardware-based speech recognition systems have emerged in recent years. While past efforts have demonstrated drastic improvements over software-based speech recognition systems, ...
The goal of this thesis is to create a suitable standard for evaluating lazy evaluation techniques, and to use this standard to compare existing methods of lazy evaluation in C++. For our standard we will create a rigorous ...
Missing data is found in virtually every large database, and can be a significant challenge for researchers who want to create analyses on the data. Several approaches have been developed to deal with missing data, but ...
Natural language communication with robots has obvious uses in almost all areas of life. Computer-based natural language interaction is an active area of research in Computational Linguistics and AI. While there have been ...
The problem of computers understanding and communicating with humans using natural languages such as English is a complicated task with many details to examine and explore. The goal of this project, then, is to examine ...
The Number Field Sieve is currently the fastest algorithm for factoring. This paper covers each step of the algorithm explaining in detail the
mathematics behind this version of the algorithm. The conjectured time complexity ...
We collect the proofs and lemmas which enable linear time algorithms for first-order sentences on graph classes with bounded expansion. Bounded expansion is a property limiting the edge to vertex ratio of a graph and its ...