With the large number of Websites promoting the use of illicit drugs, it has become important to screen these sites for the protection of children on the Internet. Conventional ke...
J. Z. Wang, Nianhua Xie, Weiming Hu, Xi Li, Xiaoqi...
Scaling discrete AdaBoost to handle real-valued weak hypotheses has often been done under the auspices of convex optimization, but little is generally known from the original boost...
To deal with the frequent, foreseeable and variable disconnections that occur in a mobile environment, we introduce a exible, two-level consistency model. Semantically related or ...
Deterministic k-tape and multitape Turing machines with one-way, two-way and without a separated input tape are considered. We investigate the classes of languages acceptable by s...
We consider a model of analog computation which can recognize various languages in real time. We encode an input word as a point in Rd by composing iterated maps, and then apply i...