Sciweavers

385 search results - page 54 / 77
» Levels of Description: A Novel Approach to Dynamical Hierarc...
Sort
View
AAAI
1997
13 years 8 months ago
Building Concept Representations from Reusable Components
Our goal is to build knowledge-based systems capable of answering a wide variety of questions, including questions that are unanticipated when the knowledge base is built. For sys...
Peter Clark, Bruce W. Porter
ISCAS
2006
IEEE
186views Hardware» more  ISCAS 2006»
14 years 1 months ago
An FCC compliant pulse generator for IR-UWB communications
—In [1], we have shown that it is feasible to design filters with arbitrary waveform responses and therefore we propose an ultra-wideband pulse generator incorporating a filter w...
Sumit Bagga, Sandro A. P. Haddad, Wouter A. Serdij...
IANDC
2010
95views more  IANDC 2010»
13 years 4 months ago
Structured anaphora to quantifier domains
The paper proposes a novel analysis of quantificational subordination, e.g. Harvey courts a woman at every convention. {She is very pretty. vs. She always comes to the banquet with...
Adrian Brasoveanu
TFS
2008
123views more  TFS 2008»
13 years 7 months ago
Numerical and Linguistic Prediction of Time Series With the Use of Fuzzy Cognitive Maps
Abstract--In this paper, we introduce a novel approach to timeseries prediction realized both at the linguistic and numerical level. It exploits fuzzy cognitive maps (FCMs) along w...
Wojciech Stach, Lukasz A. Kurgan, Witold Pedrycz
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 7 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon