Sciweavers

1045 search results - page 104 / 209
» The Use of Exceptions
Sort
View
EACL
1993
ACL Anthology
13 years 9 months ago
Two-level Description of Turkish Morphology
: This paper describes a full two-level morphological description 5,9 of Turkish word structures. The description has been implemented using the PC-KIMMO environment 2 and is based...
Kemal Oflazer
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 8 months ago
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
The use of RFID tag which identifies a thing and an object will be expanded with progress of ubiquitous society, and it is necessary to study how to construct RFID network system ...
Shin-ichi Kuribayashi
KAIS
2006
77views more  KAIS 2006»
13 years 8 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
TMM
2002
158views more  TMM 2002»
13 years 7 months ago
Foveated video quality assessment
Most image and video compression algorithms that have been proposed to improve picture quality relative to compression efficiency have either been designed based on objective crite...
Sanghoon Lee, Marios S. Pattichis, Alan C. Bovik
TOMACS
2002
101views more  TOMACS 2002»
13 years 7 months ago
Efficient simulation of a tandem Jackson network
In this paper we consider a two-node tandem Jackson network. Starting from a given state, we are interested in estimating the probability that the content of the second buffer exc...
Dirk P. Kroese, Victor F. Nicola