摘要:
Methods and systems for fast translation memory search include, in response to an input query string, identifying a plurality of hypothesis strings stored in a translation memory as candidates to match the query string. One or more candidates are eliminated, using a processor, where string lengths between the candidates and the query string are at least a cutoff value representing a string edit distance. One or more candidates are eliminated where differences in word frequency distributions between the candidates and the query string are at least the cutoff value. One or more candidates are eliminated by employing a dynamic programming matrix where string edit distances between the candidates and the query string are at least the cutoff value. A number of remaining candidates are outputted as matches to the query string.
摘要:
Methods and systems for fast translation memory search include, in response to an input query string, identifying a plurality of hypothesis strings stored in a translation memory as candidates to match the query string. One or more candidates are eliminated, using a processor, where string lengths between the candidates and the query string are at least a cutoff value representing a string edit distance. One or more candidates are eliminated where differences in word frequency distributions between the candidates and the query string are at least the cutoff value. One or more candidates are eliminated by employing a dynamic programming matrix where string edit distances between the candidates and the query string are at least the cutoff value. A number of remaining candidates are outputted as matches to the query string.
摘要:
Systems, methods and tools are provided for generating applications that are automatically optimized for efficient deployment in a computing environment based on parameterized criteria. In particular, systems, methods and tools for generating network applications are provided, which automatically partition a functional description of a network application into a set of application modules (e.g., pages) according to parameterized criteria that optimizes the network application for efficient network performance by minimizing application latency.
摘要:
A method, system, and computer readable storage medium including a computer readable program are provided. The method includes storing a set of sentences in a memory device. The method further includes receiving an input translated phrase and searching the set of sentences for a subset of sentences closest to the input translated phrase based on a set of respective distances to the sentences in the set with respect to the input translated phrase. The method also includes calculating and outputting a language model score for the subset of sentences based on a function of a subset of respective distances pertaining to the subset of sentences.
摘要:
A method for data concealment between two parties in a system, including: permitting the system to solicit one or more data from a user; permitting the system to generate a traversed path in a graph by using the one or more data provided by the user to generate the traversed path; performing a sequence of computations; associating square matrices to each connected node of the plurality of nodes of the traversed path in the graph; initiating each of the sequence of computations with a random vector; performing matrix multiplications at each step in the sequence of computations; obtaining a result vector; using the result vector of a matrix and a vector product of each connected node of the plurality of nodes of the traversed path as a vector in a subsequent node in the traversed path; comparing an outcome of the sequence of computations to a value associated with the traversed path of a correct password.
摘要:
A method for data concealment between two parties in a system, including: permitting the system to solicit one or more data from a user; permitting the system to generate a traversed path in a graph by using the one or more data provided by the user to generate the traversed path; performing a sequence of computations; associating square matrices to each connected node of the plurality of nodes of the traversed path in the graph; initiating each of the sequence of computations with a random vector; performing matrix multiplications at each step in the sequence of computations; obtaining a result vector; using the result vector of a matrix and a vector product of each connected node of the plurality of nodes of the traversed path as a vector in a subsequent node in the traversed path; comparing an outcome of the sequence of computations to a value associated with the traversed path of a correct password.
摘要:
A method is presented which reduces data flow and thereby increases processing capacity while preserving a high level of accuracy in a distributed speech processing environment for speaker detection. The method and system of the present invention includes filtering out data based on a target speaker specific subset of labels using data filters. The method preserves accuracy and passes only a fraction of the data by optimizing target specific performance measures. Therefore, a high level of speaker recognition accuracy is maintained while utilizing existing processing capabilities.
摘要:
A method is presented which reduces data flow and thereby increases processing capacity while preserving a high level of accuracy in a distributed speech processing environment for speaker detection. The method and system of the present invention includes filtering out data based on a target speaker specific subset of labels using data filters. The method preserves accuracy and passes only a fraction of the data by optimizing target specific performance measures. Therefore, a high level of speaker recognition accuracy is maintained while utilizing existing processing capabilities.
摘要:
A method for data concealment between two parties in a system, including: permitting the system to solicit one or more data from a user; permitting the system to generate a traversed path in a graph by using the one or more data provided by the user to generate the traversed path; performing a sequence of computations; associating square matrices to each connected node of the plurality of nodes of the traversed path in the graph; initiating each of the sequence of computations with a random vector; performing matrix multiplications at each step in the sequence of computations; obtaining a result vector; using the result vector of a matrix and a vector product of each connected node of the plurality of nodes of the traversed path as a vector in a subsequent node in the traversed path; comparing an outcome of the sequence of computations to a value associated with the traversed path of a correct password.
摘要:
A method is presented which reduces data flow and thereby increases processing capacity while preserving a high level of accuracy in a distributed speech processing environment for speaker detection. The method and system of the present invention includes filtering out data based on a target speaker specific subset of labels using data filters. The method preserves accuracy and passes only a fraction of the data by optimizing target specific performance measures. Therefore, a high level of speaker recognition accuracy is maintained while utilizing existing processing capabilities.