Sciweavers

1824 search results - page 187 / 365
» Practices and Techniques for Engineering Process Capability ...
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
Towards robust word discovery by self-similarity matrix comparison
Word discovery is the task of discovering and collecting occurrences of repeating words in the absence of prior acoustic and linguistic knowledge, or training material. The capabi...
Armando Muscariello, Guillaume Gravier, Fré...
CSC
2006
15 years 5 months ago
A New Migration Model For Distributed Genetic Algorithms
Genetic algorithms are heuristic search algorithm used in science, engineering and many other areas. They are powerful but slow because of their evolutionary nature that mimics th...
Taisir Eldos
134
Voted
FORTE
2007
15 years 5 months ago
Transactional Reduction of Component Compositions
Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composi...
Serge Haddad, Pascal Poizat
ICASSP
2009
IEEE
15 years 10 months ago
MIMO decoding based on stochastic reconstruction from multiple projections
Least squares (LS) fitting is one of the most fundamental techniques in science and engineering. It is used to estimate parameters from multiple noisy observations. In many probl...
Amir Leshem, Jacob Goldberger
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 5 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...