53,038 research outputs found

    Hakha Lai Definites

    Get PDF
    This paper uses fieldwork data to investigate definite expressions in Hakha Lai, a Kuki-Chin language spoken in western Burma/Myanmar and southern Indianapolis. Previous investigations of definite expressions (Hawkins 1978, Heim 1982, Roberts 2003, Schwarz 2009, and others) have posited properties such as uniqueness and identifiability as well as anaphoric reference as key features of definiteness. In an analysis of German definite articles, Schwarz (2009) proposes that definite expressions can be divided into two categories, weak definites, correlated with the semantic uniqueness of a referent, and strong definites which are correlated with anaphoric reference. Hakha Lai has two postnominal adjuncts, kha and cu, whose behavior is consistent with Schwarz’s weak and strong definites. This data from Hakha Lai expands upon previous research on definite expressions cross-linguistically and investigates the relationship between definiteness and its morphosemantic representations in natural language

    Lai v. Dist V C Ethics Comm

    Get PDF
    USDC for the District of New Jerse

    Simple vs complex temporal recurrences for video saliency prediction

    Get PDF
    This paper investigates modifying an existing neural network architecture for static saliency prediction using two types of recurrences that integrate information from the temporal domain. The first modification is the addition of a ConvLSTM within the architecture, while the second is a conceptually simple exponential moving average of an internal convolutional state. We use weights pre-trained on the SALICON dataset and fine-tune our model on DHF1K. Our results show that both modifications achieve state-of-the-art results and produce similar saliency maps. Source code is available at https://git.io/fjPiB

    The Origins of Terrorism: Cross-Country Estimates on Socio-economic Determinants of Terrorism

    Get PDF
    As a prerequisite of an appropriate anti-terror strategy, it is indispensable to assess the underlying causes of terror. We examine social and economic conditions in the country of origin of terrorist attacks, claiming that low opportunity costs of terror, e.g., approximated by slow growth and poor institutions raise the likelihood of terror and the willingness in the population to support terror. Using a negative binomial regression model, we are able to show that unfortunate socio-economic conditions in a country are likely to reduce the opportunity costs of potential terrorists and increase the number of terrorist attacks originating from a specific country. Interestingly, this effect is particularly relevant after a certain level of development has been reached. We therefore distinguish between several broad country groups, namely the OECD, Europe and Islamic countries.terror attacks, openness, discrete choice analysis, institutions

    High Performing Hospital Enterprise Architecture

    Get PDF
    Student research poster, LAI Annual Meeting, Dana Point, C

    Organizational Assessment Processes for Lean Enterprise Transformation

    Get PDF
    Student research poster, LAI Annual Meeting, Dana Point, C

    Finding Opportunities for Commonality Across Complex Systems: A Study of Unmanned Aircraft Systems

    Get PDF
    Student research poster, LAI Annual Meeting, Dana Point, C

    Divide and Fuse: A Re-ranking Approach for Person Re-identification

    Full text link
    As re-ranking is a necessary procedure to boost person re-identification (re-ID) performance on large-scale datasets, the diversity of feature becomes crucial to person reID for its importance both on designing pedestrian descriptions and re-ranking based on feature fusion. However, in many circumstances, only one type of pedestrian feature is available. In this paper, we propose a "Divide and use" re-ranking framework for person re-ID. It exploits the diversity from different parts of a high-dimensional feature vector for fusion-based re-ranking, while no other features are accessible. Specifically, given an image, the extracted feature is divided into sub-features. Then the contextual information of each sub-feature is iteratively encoded into a new feature. Finally, the new features from the same image are fused into one vector for re-ranking. Experimental results on two person re-ID benchmarks demonstrate the effectiveness of the proposed framework. Especially, our method outperforms the state-of-the-art on the Market-1501 dataset.Comment: Accepted by BMVC201

    Application of Prediction Markets for Cost and Risk Assessment in Defense Acquisition Programs

    Get PDF
    Student research poster, LAI Annual Meeting, Dana Point, C
    • 

    corecore