Sciweavers

1280 search results - page 99 / 256
» Soft Typing with Conditional Types
Sort
View
IGPL
2010
158views more  IGPL 2010»
13 years 7 months ago
Ontology-revision operators based on reinterpretation
Communication between natural or artificial agents relies on the use of a common vocabulary. Since sharing terms does not necessarily imply that the terms have exactly the same m...
Carola Eschenbach, Özgür L. Öz&cced...
ATAL
2007
Springer
14 years 3 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 8 months ago
Interference Channel with an Out-of-Band Relay
A Gaussian interference channel (IC) with a relay is considered. The relay is assumed to operate over an orthogonal band with respect to the underlying IC, and the overall system i...
Onur Sahin, Osvaldo Simeone, Elza Erkip
SPEECH
2011
13 years 4 months ago
SNR loss: A new objective measure for predicting the intelligibility of noise-suppressed speech
Most of the existing intelligibility measures do not account for the distortions present in processed speech, such as those introduced by speech-enhancement algorithms. In the pre...
Jianfen Ma, Philipos C. Loizou
FLAIRS
2010
13 years 11 months ago
Using a Graph-Based Approach for Discovering Cybercrime
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder, Jeffrey Graves