We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. New identification method of linear pointer instrument

    In industry, the main way to get data of pointer meter in industrial production is recorded by individual, and the data is analysed and processed...

    Fengcai Huo, Ang Li, ... Tao Yu in Multimedia Tools and Applications
    Article 26 July 2022
  2. Complete Decision Procedure for the Theory of Bounded Pointer Arithmetic

    Abstract

    The process of develo** C programs is quite often prone to errors associated with the use of pointer arithmetic and operations on memory...

    R. F. Sadykov, M. U. Mandrykin in Programming and Computer Software
    Article 21 December 2022
  3. 2-Pointer Logic

    For reasoning about properties of pointers, we consider conjunctions of equalities and dis-equalities between terms built up from address constants...
    Helmut Seidl, Julian Erhard, ... Sarah Tilscher in Taming the Infinities of Concurrency
    Chapter 2024
  4. A Hybrid Approach for Automatic Text Summarization by Handling Out-of-Vocabulary Words Using TextR-BLG Pointer Algorithm

    Abstract

    Long documents such as scientific papers and government reports, often discuss substantial issues in long conversation, which are...

    Sonali Mhatre, Lata L. Ragha in Scientific and Technical Information Processing
    Article 01 March 2024
  5. A novel automatic reading method of pointer meters based on deep learning

    The automatic reading of pointer meters is significantly important to data monitoring and efficient measurement in the industrial field. However, the...

    Junjiao Sun, Zhiqing Huang, Yanxin Zhang in Neural Computing and Applications
    Article 06 December 2022
  6. An innovative Telugu text summarization framework using the pointer network and optimized attention layer

    Summarizing lengthy text involves distilling crucial information into a concise form by covering the key events in the source text. Previous...

    Varaprasad Rao M, Kunal Chakma, ... Dwijen Rudrapal in Multimedia Tools and Applications
    Article 24 April 2024
  7. Cast a Pointer to void* When Printing Through printf

    When printing out a pointer’s value (the memory address it points to) using a printf function and a %p format specifier, we need to cast that pointer...
    Slobodan Dmitrović in Modern C for Absolute Beginners
    Chapter 2024
  8. Neuronale Optimierung mit dem Pointer-Netzwerk

    In diesem Kapitel wird eine neuronale kombinatorische Optimierungsmethode (NCO-Methode) von Bello et al. zur Lösung des Problems des...
    Ralf Hollstein in Optimierungsmethoden
    Chapter 2023
  9. Method for solving constrained 0-1 quadratic programming problems based on pointer network and reinforcement learning

    The constrained 0-1 quadratic programming problem (CBQP) is an important problem of integer programming, and many combinatorial optimization problems...

    Shenshen Gu, Yuxi Zhuang in Neural Computing and Applications
    Article 30 July 2022
  10. Lexicon enhanced Chinese named entity recognition with pointer network

    In recent time, lexicon-based LSTM and pre-training language models are combined to explore the Chinese Named Entity Recognition (NER) and achieve...

    Qian Guo, Yi Guo in Neural Computing and Applications
    Article 09 May 2022
  11. AI Based Pointer to Geometric Effects

    The aim of this work is to rediscover one of TRIZ’s best-known tools, the Pointer to geometric phenomena and effects. It is part of a large group of...
    Davide Russo, Simone Avogadri, Christian Spreafico in Towards AI-Aided Invention and Innovation
    Conference paper 2023
  12. Parsing Pointer Movements in a Target Unaware Environment

    Analysis of the movements of the Mouse pointer could lead to valuable insights into a user’s mental status in digital environments. Previous research...
    Jonah Scudere-Weiss, Abigail Wilson, ... John Magee in Engineering Psychology and Cognitive Ergonomics
    Conference paper 2023
  13. Improving knowledge-based dialogue generation through two-stage knowledge selection and knowledge selection-guided pointer network

    Existing End-to-End neural models for dialogue generation tend to generate generic and uninformative responses. Recently, knowledge-based dialogue...

    Mengjuan Liu, Pei Zhao, ... Yunfan Yang in Journal of Intelligent Information Systems
    Article 02 June 2022
  14. Graph Pointer Network and Reinforcement Learning for Thinnest Path Problem

    The complexity and NP-hard nature make finding optimal solutions challenging for combinatorial optimization problems (COPs) using traditional...
    **g**g Li, Yang Wang, Chuang Zhang in Neural Information Processing
    Conference paper 2024
  15. A Code Completion Approach Combining Pointer Network and Transformer-XL Network

    Code completion is an integral component of modern integrated development environments, as it not only facilitates the software development process...
    Conference paper 2024
  16. Function Pointer Parameters

    In this chapter, we disassemble and analyze a project that used function parameters which are pointers.
    Chapter 2023
  17. Function Pointer Parameters

    In this chapter, we disassemble and analyze a project that used function parameters which are pointers.
    Chapter 2023
  18. Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation

    In this paper, we combine static code analysis and symbolic execution to bypass Intel’s Control-Flow Enforcement Technology (CET) by exploiting...
    Alessandro Bertani, Marco Bonelli, ... Mario Polino in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2023
  19. VPnet: A Vulnerability Prioritization Approach Using Pointer Network and Deep Reinforcement Learning

    Vulnerability prioritization is becoming increasingly prominent in vulnerability management. The contradiction between mountains of vulnerability...
    Zhoushi Sheng, Bo Yu, ... Yongyi Zhang in Digital Forensics and Cyber Crime
    Conference paper 2023
  20. Frame Pointer and Local Variables

    In this chapter, we look into the stack layout of the more complex code: addressing arrays, local variables, and compiler-emitted code for the...
    Chapter 2023
Did you find what you were looking for? Share feedback.