Sciweavers

519 search results - page 51 / 104
» Comparing Instance Generation Methods for Automated Reasonin...
Sort
View
RSP
2003
IEEE
169views Control Systems» more  RSP 2003»
14 years 1 months ago
Rapid Prototyping and Incremental Evolution Using SLAM
The paper shows the outlines of the SLAM system and how its design is suitable for automating rapid prototyping. The system includes a very expressive object oriented specificati...
Ángel Herranz-Nieva, Juan José Moren...
LICS
1999
IEEE
14 years 2 days ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
CSL
2004
Springer
13 years 7 months ago
Factor analysed hidden Markov models for speech recognition
Recently various techniques to improve the correlation model of feature vector elements in speech recognition systems have been proposed. Such techniques include semi-tied covaria...
Antti-Veikko I. Rosti, M. J. F. Gales
EOR
2007
165views more  EOR 2007»
13 years 7 months ago
Adaptive credit scoring with kernel learning methods
Credit scoring is a method of modelling potential risk of credit applications. Traditionally, logistic regression, linear regression and discriminant analysis are the most popular...
Yingxu Yang
BMCBI
2007
237views more  BMCBI 2007»
13 years 8 months ago
FLAME, a novel fuzzy clustering method for the analysis of DNA microarray data
Background: Data clustering analysis has been extensively applied to extract information from gene expression profiles obtained with DNA microarrays. To this aim, existing cluster...
Limin Fu, Enzo Medico