Sciweavers

759 search results - page 99 / 152
» What Can Be Implemented Anonymously
Sort
View
ICTAI
2009
IEEE
14 years 4 months ago
Emergence of Memory-like Behavior in Reactive Agents Using External Markers
Early primitive animals with simple feed-forward neuronal circuits were limited to reactive behavior. Through evolution, they were gradually equipped with memory and became able t...
Ji Ryang Chung, Yoonsuck Choe
LICS
2009
IEEE
14 years 4 months ago
Indexed Containers
The search for an expressive calculus of datatypes in which canonical algorithms can be easily written and proven correct has proved to be an enduring challenge to the theoretical ...
Thorsten Altenkirch, Peter Morris
ICASSP
2008
IEEE
14 years 4 months ago
Unsupervised optimal phoneme segmentation: Objectives, algorithm and comparisons
Phoneme segmentation is a fundamental problem in many speech recognition and synthesis studies. Unsupervised phoneme segmentation assumes no knowledge on linguistic contents and a...
Yu Qiao, Naoya Shimomura, Nobuaki Minematsu
KBSE
2008
IEEE
14 years 4 months ago
Becoming responsive to service usage and performance changes by applying service feedback metrics to software maintenance
Software vendors are unaware of how their software performs in the field. They do not know what parts of their software are used and appreciated most and have little knowledge ab...
Henk van der Schuur, Slinger Jansen, Sjaak Brinkke...
LCN
2008
IEEE
14 years 4 months ago
TCP mechanisms for improving the user experience for time-dependent thin-stream applications
—A wide range of Internet-based services that use reliable transport protocols display what we call thin-stream properties. This means that the application sends data with such a...
Andreas Petlund, Kristian Evensen, Carsten Griwodz...