Sciweavers

429 search results - page 44 / 86
» Permutative Additives and Exponentials
Sort
View
CORR
2010
Springer
39views Education» more  CORR 2010»
13 years 5 months ago
Non-redundant random generation from weighted context-free languages
We address the non-redundant random generation of k words of length n from a context-free language. Additionally, we want to avoid a predefined set of words. We study the limits of...
Yann Ponty
IJACTAICIT
2010
120views more  IJACTAICIT 2010»
13 years 5 months ago
Representing Image Search Performance Using Time Series Models
Image search engines tend to return a large number of images which the engines consider to be relevant, and such pool of results generally is very large and may be regarded to be ...
Xiaoling Wang, Clement. H. C. Leung
CORR
2011
Springer
213views Education» more  CORR 2011»
13 years 2 months ago
Adapting to Non-stationarity with Growing Expert Ensembles
Forecasting sequences by expert ensembles generally assumes stationary or near-stationary processes; however, in complex systems and many real-world applications, we are frequentl...
Cosma Rohilla Shalizi, Abigail Z. Jacobs, Aaron Cl...
ICASSP
2011
IEEE
12 years 11 months ago
Blind separation of multiple binary sources from one nonlinear mixture
We propose a new method for the blind separation of multiple binary signals from a single general nonlinear mixture. In addition to the usual independence assumption on the input ...
Konstantinos I. Diamantaras, Theophilos Papadimitr...
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...