Sciweavers

327 search results - page 51 / 66
» On the structure of the Medvedev lattice
Sort
View
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
14 years 2 months ago
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes ...
Wouter Kuijper, Jaco van de Pol
ICASSP
2008
IEEE
14 years 1 months ago
Combining open vocabulary recognition and word confusion networks
A limitation of most speech recognizers is that they only recognize words from a fixed vocabulary. In this paper, we explore a technique for addressing this deficiency using aut...
Keith Vertanen
ICCS
2005
Springer
14 years 28 days ago
Morphisms in Context
Abstract. Morphisms constitute a general tool for modelling complex relationships between mathematical objects in a disciplined fashion. In Formal Concept Analysis (FCA), morphisms...
Markus Krötzsch, Pascal Hitzler, Guo-Qiang Zh...
COOPIS
2004
IEEE
13 years 11 months ago
Aligning Ontologies and Evaluating Concept Similarities
An innate characteristic of the development of ontologies is that they are often created by independent groups of expertise, which generates the necessity of merging and aligning o...
Kleber Xavier Sampaio de Souza, Joseph Davis
DGCI
2009
Springer
13 years 10 months ago
A Linear Time and Space Algorithm for Detecting Path Intersection
For discrete sets coded by the Freeman chain describing their contour, several linear algorithms have been designed for determining their shape properties. Most of them are based ...
Srecko Brlek, Michel Koskas, Xavier Provenç...