Sciweavers

998 search results - page 81 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
AMT
2010
Springer
230views Multimedia» more  AMT 2010»
13 years 9 months ago
Visual Image Browsing and Exploration (Vibe): User Evaluations of Image Search Tasks
One of the fundamental challenges in designing an image retrieval system is choosing a method by which the images that match a given query are presented to the searcher. Traditiona...
Grant Strong, Orland Hoeber, Minglun Gong
ICASSP
2010
IEEE
13 years 9 months ago
Evaluation of random-projection-based feature combination on speech recognition
Random projection has been suggested as a means of dimensionality reduction, where the original data are projected onto a subspace using a random matrix. It represents a computati...
Tetsuya Takiguchi, Jeff Bilmes, Mariko Yoshii, Yas...
ICECCS
2010
IEEE
162views Hardware» more  ICECCS 2010»
13 years 9 months ago
A Tile-Based Approach for Self-Assembling Service Compositions
—This paper presents a novel approach to the design of self-adaptive service-oriented applications based on a new model called service tiles. The approach allows designers to dev...
Luca Cavallaro, Elisabetta Di Nitto, Carlo A. Furi...
CORR
2007
Springer
78views Education» more  CORR 2007»
13 years 8 months ago
GLRT-Optimal Noncoherent Lattice Decoding
Abstract—This paper presents new low-complexity lattice-decoding algorithms for noncoherent block detection of quadrature amplitude modulation (QAM) and pulse amplitude modulatio...
Daniel J. Ryan, Iain B. Collings, I. Vaughan L. Cl...
STTT
2008
134views more  STTT 2008»
13 years 8 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan