Sciweavers

686 search results - page 51 / 138
» Bayesian Analysis of Linear Combiners
Sort
View
ICDAR
2009
IEEE
14 years 4 months ago
Rejection Strategies with Multiple Classifiers for Handwritten Character Recognition
With rejection strategies in a handwriting recognition system, we are able to improve the reliability and accuracy of the recognized characters. In this paper, we propose several ...
Xu-Cheng Yin, Hong-Wei Hao, Yun-Feng Tang, Jun Sun...
ICISC
2007
117views Cryptology» more  ICISC 2007»
13 years 10 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
AGP
1999
IEEE
14 years 1 months ago
Enhancing Sharing for Precision
Regarding the precision of combined domains including Jacobs and Langen's Sharing there is a core of techniques, such as the standard integration with freeness and linearity ...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
14 years 1 months ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby
IOR
2006
177views more  IOR 2006»
13 years 9 months ago
Combinatorial Benders' Cuts for Mixed-Integer Linear Programming
Mixed-Integer Programs (MIP's) involving logical implications modelled through big-M coefficients, are notoriously among the hardest to solve. In this paper we propose and an...
Gianni Codato, Matteo Fischetti