Sciweavers

1556 search results - page 189 / 312
» Information Envelope and its Information Integrity Implicati...
Sort
View
CSL
2008
Springer
13 years 10 months ago
User simulation in a stochastic dialog system
We present a new methodology of user simulation applied to the evaluation and refinement of stochastic dialog systems. Common weaknesses of these systems are the scarceness of the...
Francisco Torres, Emilio Sanchis, Encarna Segarra
ENGL
2006
170views more  ENGL 2006»
13 years 10 months ago
Hybrid Genetic Algorithms: A Review
Hybrid genetic algorithms have received significant interest in recent years and are being increasingly used to solve real-world problems. A genetic algorithm is able to incorporat...
Tarek A. El-Mihoub, Adrian A. Hopgood, Lars Nolle,...
IVC
2006
112views more  IVC 2006»
13 years 10 months ago
A comparison between BEM and FEM for elastic registration of medical images
The aim of medical image registration is to bring different images into the best possible spatial correspondence in order to obtain complementary information for clinical applicat...
Evgeny Gladilin, Vladimir Pekar, Karl Rohr, H. Sie...
JNCA
2006
86views more  JNCA 2006»
13 years 10 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
IJIM
2007
84views more  IJIM 2007»
13 years 10 months ago
Mobile e-learning course scenario model on PDA
: Web-based services mobile learning can enable collaborative learning and access to different information sources in actual problem-solving situations. The PDA’s are now designe...
Jeanne Schreurs