Sciweavers

23 search results - page 4 / 5
» cimca 2006
Sort
View
CIMCA
2006
IEEE
14 years 22 days ago
Constrained Circular Hidden Markov Models for Recognizing Deformed Shapes
In this paper, we analyse the properties of the standard circular hidden Markov model (HMM) on 2D shape recognition. We point out the limitations of the circular HMMs and further ...
Jinhai Cai
CIMCA
2006
IEEE
14 years 22 days ago
Direct Adaptive Fuzzy Control with Less Restrictions on the Control Gain
: In the adaptive fuzzy control field for affine nonlinear systems, there are two basic configurations: direct and indirect. It is well known that the direct configuration needs mo...
Phi Anh Phan, Timothy J. Gale
CIMCA
2006
IEEE
14 years 22 days ago
Assessing and Assuring Trust in E-Commerce Systems
On-line trading or Internet Commerce restoring to ECommerce systems are gradually replacing the traditional commerce activities. Internet users must have reasonable faith on the u...
Zhongwei Zhang, Zhen Wang
CIMCA
2006
IEEE
14 years 22 days ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
CIMCA
2006
IEEE
13 years 8 months ago
Identification of Document Language is Not yet a Completely Solved Problem
Existing Language Identification (LID) approaches do reach 100% precision, in most common situations, when dealing with documents written in just one language, and when those docu...
Joaquim Ferreira da Silva, Gabriel Pereira Lopes