Sciweavers

303 search results - page 32 / 61
» Unifying Theories of Confidentiality
Sort
View
NAACL
1994
13 years 11 months ago
Language Identification via Large Vocabulary Speaker Independent Continuous Speech Recognition
The goal of this study is to evaluate the potential for using large vocabulary continuous speech recognition as an engine for automatically classifying utterances according to the...
Steve Lowe, Anne Demedts, Larry Gillick, Mark Mand...
AUTOMATICA
2008
107views more  AUTOMATICA 2008»
13 years 10 months ago
Kalman filters in non-uniformly sampled multirate systems: For FDI and beyond
This paper consists of two parts. The first part is the development of a datadriven Kalman filter for a non-uniformly sampled multirate (NUSM) system, including identification of ...
Weihua Li, Sirish L. Shah, Deyun Xiao
CORR
2008
Springer
95views Education» more  CORR 2008»
13 years 10 months ago
Depth as Randomness Deficiency
Depth of an object concerns a tradeoff between computation time and excess of program length over the shortest program length required to obtain the object. It gives an unconditio...
Luis Antunes 0002, Armando Matos, Andre Souto, Pau...
CORR
2006
Springer
96views Education» more  CORR 2006»
13 years 10 months ago
Metric entropy in competitive on-line prediction
Competitive on-line prediction (also known as universal prediction of individual sequences) is a strand of learning theory avoiding making any stochastic assumptions about the way...
Vladimir Vovk
ENTCS
2006
142views more  ENTCS 2006»
13 years 10 months ago
The Rewriting Logic Semantics Project
Rewriting logic is a flexible and expressive logical framework that unifies algebraic denotational semantics and structural operational semantics (SOS) in a novel way, avoiding th...
José Meseguer, Grigore Rosu