Search
Search Results
-
New identification method of linear pointer instrument
In industry, the main way to get data of pointer meter in industrial production is recorded by individual, and the data is analysed and processed...
-
Complete Decision Procedure for the Theory of Bounded Pointer Arithmetic
AbstractThe process of develo** C programs is quite often prone to errors associated with the use of pointer arithmetic and operations on memory...
-
2-Pointer Logic
For reasoning about properties of pointers, we consider conjunctions of equalities and dis-equalities between terms built up from address constants... -
A Hybrid Approach for Automatic Text Summarization by Handling Out-of-Vocabulary Words Using TextR-BLG Pointer Algorithm
AbstractLong documents such as scientific papers and government reports, often discuss substantial issues in long conversation, which are...
-
A novel automatic reading method of pointer meters based on deep learning
The automatic reading of pointer meters is significantly important to data monitoring and efficient measurement in the industrial field. However, the...
-
An innovative Telugu text summarization framework using the pointer network and optimized attention layer
Summarizing lengthy text involves distilling crucial information into a concise form by covering the key events in the source text. Previous...
-
Cast a Pointer to void* When Printing Through printf
When printing out a pointer’s value (the memory address it points to) using a printf function and a %p format specifier, we need to cast that pointer... -
Neuronale Optimierung mit dem Pointer-Netzwerk
In diesem Kapitel wird eine neuronale kombinatorische Optimierungsmethode (NCO-Methode) von Bello et al. zur Lösung des Problems des... -
Method for solving constrained 0-1 quadratic programming problems based on pointer network and reinforcement learning
The constrained 0-1 quadratic programming problem (CBQP) is an important problem of integer programming, and many combinatorial optimization problems...
-
Lexicon enhanced Chinese named entity recognition with pointer network
In recent time, lexicon-based LSTM and pre-training language models are combined to explore the Chinese Named Entity Recognition (NER) and achieve...
-
AI Based Pointer to Geometric Effects
The aim of this work is to rediscover one of TRIZ’s best-known tools, the Pointer to geometric phenomena and effects. It is part of a large group of... -
Parsing Pointer Movements in a Target Unaware Environment
Analysis of the movements of the Mouse pointer could lead to valuable insights into a user’s mental status in digital environments. Previous research... -
Improving knowledge-based dialogue generation through two-stage knowledge selection and knowledge selection-guided pointer network
Existing End-to-End neural models for dialogue generation tend to generate generic and uninformative responses. Recently, knowledge-based dialogue...
-
Graph Pointer Network and Reinforcement Learning for Thinnest Path Problem
The complexity and NP-hard nature make finding optimal solutions challenging for combinatorial optimization problems (COPs) using traditional... -
A Code Completion Approach Combining Pointer Network and Transformer-XL Network
Code completion is an integral component of modern integrated development environments, as it not only facilitates the software development process... -
Function Pointer Parameters
In this chapter, we disassemble and analyze a project that used function parameters which are pointers. -
Function Pointer Parameters
In this chapter, we disassemble and analyze a project that used function parameters which are pointers. -
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation
In this paper, we combine static code analysis and symbolic execution to bypass Intel’s Control-Flow Enforcement Technology (CET) by exploiting... -
VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning
Vulnerability prioritization is becoming increasingly prominent in vulnerability management. The contradiction between mountains of vulnerability... -
Frame Pointer and Local Variables
In this chapter, we look into the stack layout of the more complex code: addressing arrays, local variables, and compiler-emitted code for the...