Sciweavers

44 search results - page 5 / 9
» Approximate Entailment
Sort
View
INTERSPEECH
2010
13 years 4 months ago
Unscented transform with online distortion estimation for HMM adaptation
In this paper, we propose to improve our previously developed method for joint compensation of additive and convolutive distortions (JAC) applied to model adaptation. The improvem...
Jinyu Li, Dong Yu, Yifan Gong, L. Deng
SAC
2010
ACM
14 years 4 months ago
Variable ranges in linear constraints
We introduce an extension of linear constraints, called linearrange constraints, which allows for (meta-)reasoning about the approximation width of variables. Semantics for linear...
Salvatore Ruggieri, Fred Mesnard
WILF
2009
Springer
150views Fuzzy Logic» more  WILF 2009»
14 years 4 months ago
General Fuzzy Answer Set Programs
A number of generalizations of answer set programming have been proposed in the literature to deal with vagueness, uncertainty, and partial rule satisfaction. We introduce a unifyi...
Jeroen Janssen, Steven Schockaert, Dirk Vermeir, M...
TMC
2010
196views more  TMC 2010»
13 years 8 months ago
Joint Routing, Channel Assignment, and Scheduling for Throughput Maximization in General Interference Models
—Throughput optimization in wireless networks with multiple channels and multiple radio interfaces per node is a challenging problem. For general traffic models (given a set of ...
Mahmoud Al-Ayyoub, Himanshu Gupta
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 9 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...