Sciweavers

140 search results - page 27 / 28
» Configuration Theories
Sort
View
VLDB
1987
ACM
92views Database» more  VLDB 1987»
14 years 2 months ago
Mind Your Grammar: a New Approach to Modelling Text
Beginning to create the New Oxford English Dictionary database has resulted in the realization that databases for reference texts are unlike those for conventional enterprises. Wh...
Gaston H. Gonnet, Frank Wm. Tompa
CODES
2006
IEEE
14 years 25 days ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
EUSFLAT
2007
156views Fuzzy Logic» more  EUSFLAT 2007»
14 years 9 days ago
Fuzzy Calculating and Fuzzy Control in Wireless Sensor Network
At present time configurable wireless sensor networks are given special consideration. Wireless sensor networks are now a static elements union. To make such a network a powerful ...
Irina Kalganova
ESANN
2008
14 years 9 days ago
Learning to play Tetris applying reinforcement learning methods
In this paper the application of reinforcement learning to Tetris is investigated, particulary the idea of temporal difference learning is applied to estimate the state value funct...
Alexander Groß, Jan Friedland, Friedhelm Sch...
BIOCOMP
2006
14 years 8 days ago
Surgeon's Magic Wand: A Screen Pointing Interactive Method
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...
Naren Vira, Shaleen Vira