• No results found

tree traversal

Parsing as Tree Traversal

Parsing as Tree Traversal

... PARSING AS TREE TRAVERSAL P A R S I N G AS T R E E T R A V E R S A L Dale Gerdemann* Seminar ffir Sprachwissenschaft, Universiti t T bingen t A B S T R A C T T h i s p a p e r p r e s e n t s a unifie[.] ...

5

DATA ENCRYPTION USING BINARY TREE TRAVERSAL (DEBTT)

DATA ENCRYPTION USING BINARY TREE TRAVERSAL (DEBTT)

... This section explains the overall working model of the proposed method. The proposed method uses two levels of encryption. The first level encryption is based on substitution using ASCII values and the second level of ...

10

A Combined Approach of Cryptography to Enhance the Security Using Traditional DNA and Tree Traversal Technique

A Combined Approach of Cryptography to Enhance the Security Using Traditional DNA and Tree Traversal Technique

... order tree traversal which will have the maximum swapping of the nodes and it will serve more security for the sender in the transmission of the data to the ...perform tree traversal approach ...

10

Cryptographic Techniques using Binary Tree and Tree Traversal

Cryptographic Techniques using Binary Tree and Tree Traversal

... Step 4: Divide each word into 2 equal parts according to the numbers given in step 3. Lesser than or equal to numbers will go to left side and greater elements will go to right hand side just like binary search ...

6

Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm

Automated Verification of the Deutsch-Schorr-Waite Tree-Traversal Algorithm

... the traversal continues by moving into the (sub)tree rooted at r (see lines [15] and ...the traversal backtracks to n, the algorithm reaches lines [10]–[14] of ...

19

Binary Tree’s Recursion Traversal Algorithm and Its Improvement

Binary Tree’s Recursion Traversal Algorithm and Its Improvement

... preorder traversal and time complex- ity is O (n), then preorder compared to O (n^2), algorithm is relatively ...postorder traversal non-recursive algorithm description, in process of postorder ...

6

Traversal of Trees

Traversal of Trees

... A tree consists of three ...the traversal is divide on the basis of the process of visiting the nodes of a ...tree. Tree traversal is a process of moving through a tree in a ...

6

A Discriminative Model for Tree to Tree Translation

A Discriminative Model for Tree to Tree Translation

... lexicalized tree adjoining grammar (LTAG) (Joshi, 1985) approach to syntax described by Frank ...parse tree for the sentence we know that the main obstacle has been the predictable resistance of ...

10

Page Quality Optimization in Crawler's Queue through Employing Graph Traversal Algorithms

Page Quality Optimization in Crawler's Queue through Employing Graph Traversal Algorithms

... In order to have a crawler queue with pages of higher quality regarding the authority of Web pages and no or less content drift to the seed page, search engines should employ more intelligent crawler module. This paper ...

7

Evaluation of Plasmodium vivax Cell-Traversal Protein for Ookinetes and Sporozoites as a Preerythrocytic P. vivax Vaccine

Evaluation of Plasmodium vivax Cell-Traversal Protein for Ookinetes and Sporozoites as a Preerythrocytic P. vivax Vaccine

... While the protective efficacy of RTS,S/AS01 is encouraging, improvements will be necessary to induce higher levels of protective immunity as well as broad strain- transcending immunity. A strategy for increasing the ...

14

Dependency Tree Transformation with Tree Transducers

Dependency Tree Transformation with Tree Transducers

... a tree transducer are ranked. A node in a dependency tree can have any number of children, therefore the alphabet in the tree can be assumed to contain each symbol with multiple different ranks to ...

9

Comparing the performance of two TAG based surface realisers using controlled grammar traversal

Comparing the performance of two TAG based surface realisers using controlled grammar traversal

... Each elementary tree is associated with a flat semantic representation. For instance, in Fig- ure 1, 3 the trees for John, runs, and often are asso- ciated with the semantics name(j,john), run(a,c), and often(x), ...

9

A Tree Sequence Alignment based Tree to Tree Translation Model

A Tree Sequence Alignment based Tree to Tree Translation Model

... We conducted Chinese-to-English translation ex- periments. We trained the translation model on the FBIS corpus (7.2M+9.2M words) and trained a 4- gram language model on the Xinhua portion of the English Gigaword corpus ...

9

Investigation of E-Commerce based User’s Traversal Path Patterns using MFB and MBP

Investigation of E-Commerce based User’s Traversal Path Patterns using MFB and MBP

... user’s traversal pattern path finding and users purchasing behaviour is essential using data mining technique, where documents are interconnected together to enable collaborating access in e-commerce website ...

11

EXPERIMENTAL EVALUATION OF APRIORI AND EQUIVALENCE CLASS CLUSTERING AND BOTTOM UP LATTICE TRAVERSAL (ECLAT) ALGORITHMS

EXPERIMENTAL EVALUATION OF APRIORI AND EQUIVALENCE CLASS CLUSTERING AND BOTTOM UP LATTICE TRAVERSAL (ECLAT) ALGORITHMS

... In this paper the researcher surveyed frequent pattern mining algorithms namely Apriori and Equi- valence Class Clustering and Bottom Up Lattice Tra- versal (ECLAT) with distinct database. The goal of Apriori and ...

6

Tree Parsing with Synchronous Tree Adjoining Grammars

Tree Parsing with Synchronous Tree Adjoining Grammars

... use tree-to-string transducers (called xRLNS) that describe pairs of the form (phrase- structure tree, ...synchronous tree-adjoining grammars (STAGs) (Abeille et ...chronous tree-substitution ...

12

Tree Graphs and Orthogonal Spanning Tree Decompositions

Tree Graphs and Orthogonal Spanning Tree Decompositions

... When a new mathematical object is defined, many questions immediately arise. What properties does this object have? What is the relationship between this object and other known objects? In this way, research into ...

107

Secured Rekeying in B-Tree and NSBHO Tree

Secured Rekeying in B-Tree and NSBHO Tree

... No rebalancing is needed after an external node z is removed if the parent of z is not one child short (i.e., if z.parent is in SP, z.parent should have at least one child and, if z.parent is not in SP, z.parent should ...

10

Improving Tree to Tree Translation with Packed Forests

Improving Tree to Tree Translation with Packed Forests

... forest-based tree-to-tree ...minimal tree-to-tree ...source tree in the forest. Comparable to Moses, our forest-based tree-to-tree model achieves an absolute improvement ...

9

Unsupervised Tree Induction for Tree based Translation

Unsupervised Tree Induction for Tree based Translation

... Where r refers to the conditional context, i.e., the set of all other rules in the training data. All the probabilities in the above formulas are computed by Equation(3). We then normalize the two scores and sample a ...

12

Show all 4003 documents...

Related subjects