Sciweavers

1765 search results - page 68 / 353
» Combinations of Weak Classifiers
Sort
View
APAL
2007
63views more  APAL 2007»
13 years 8 months ago
Bounded functional interpretation and feasible analysis
In this article we study applications of the bounded functional interpretation to theories of feasible arithmetic and analysis. The main results show that the novel interpretation...
Fernando Ferreira, Paulo Oliva
ICPR
2002
IEEE
14 years 9 months ago
Rejection Strategies and Confidence Measures for a k- NN Classifier in an OCR Task
In Handwritten Character Recognition, the rejection of extraneous patterns, like image noise, strokes or corrections, can improve significantly the practical usefulness of a syste...
Javier Cano, Joaquim Arlandis, Juan Carlos P&eacut...
INTERSPEECH
2010
13 years 3 months ago
Context adaptive training with factorized decision trees for HMM-based speech synthesis
To achieve natural high quality synthesised speech in HMMbased speech synthesis, the effective modelling of complex acoustic and linguistic contexts is critical. Traditional appro...
Kai Yu, Heiga Zen, François Mairesse, Steve...
IANDC
2008
150views more  IANDC 2008»
13 years 8 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
OOPSLA
2007
Springer
14 years 2 months ago
Combining structural subtyping and external dispatch
Nominal subtyping (or user-defined subtyping) and structural subtyping each have their own strengths and weaknesses. Nominal subtyping allows programmers to explicitly express de...
Donna Malayeri