Sciweavers

470 search results - page 23 / 94
» Using Unknown Word Techniques to Learn Known Words
Sort
View
ICANN
2010
Springer
13 years 7 months ago
Using Evolutionary Multiobjective Techniques for Imbalanced Classification Data
The aim of this paper is to study the use of Evolutionary Multiobjective Techniques to improve the performance of Neural Networks (NN). In particular, we will focus on classificati...
Sandra García, Ricardo Aler, Inés Ma...
IJON
2007
90views more  IJON 2007»
13 years 10 months ago
Storage of auditory temporal patterns in the songbird telencephalon
A quantitative model of auditory learning is presented to predict how auditory patterns are stored in the songbird auditory forebrain. This research focuses on the caudomedial nid...
Patrick D. Roberts, Roberto A. Santiago, Tarciso V...
CIS
2007
Springer
14 years 4 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
JSCIC
2010
136views more  JSCIC 2010»
13 years 5 months ago
Multiple Level Sets for Piecewise Constant Surface Reconstruction in Highly Ill-Posed Problems
This paper considers highly ill-posed surface recovery inverse problems, where the sought surface in 2D or 3D is piecewise constant with several possible level values. These level...
K. van den Doel, U. M. Ascher, A. Leitão
CIKM
2003
Springer
14 years 3 months ago
Statistical transliteration for english-arabic cross language information retrieval
Out of vocabulary (OOV) words are problematic for cross language information retrieval. One way to deal with OOV words when the two languages have different alphabets, is to trans...
Nasreen Abdul Jaleel, Leah S. Larkey