Researchers in textual entailment have begun to consider inferences involving downward-entailing operators, an interesting and important class of lexical items that change the way...
Recruitment learning in hierarchies is an inherently unstable process (Valiant, 1994). This paper presents conditions on parameters for a feedforward network to ensure stable recru...
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
This paper presents an analysis of how and why a new generation of virtual reality peripherals affect virtual reality in general, and its uses for education in particular. We descr...
In this paper, minimum jerk movement on the constrained sphere was studied by using both theoretical analysis and experimental investigation. Based on the constraint optimal princ...
D. H. Sha, James L. Patton, Ferdinando A. Mussa-Iv...