We present an approach used in CSDTA (Canonical Sequence Directed Tactics Analyzer) that uses canonical sequences (Joseki) in hoping to improve computer Go programs. We collect 12...
Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
TAM (Topographic Attentive Mapping) network is a biologically-motivated neural network with Gabor function type receptive elds. However, the structure of receptive elds is a mon...
Providing users with help and other documentation is essential for any software targeted at end users. Authoring help and documentation in a platform-independent way is hard, beca...
Given that road accidents occur in a real-time environment, simple crisp functions would barely provide an estimate of the gravity of the life situation. Fuzzy-based systems are a...
K. Venkatesh, Archana Ramesh, M. Alagusundaram, J....
Hybrid set of optimally trained feed-forward, Hopfield and Elman neural networks were used as computational tools and were applied to immunoinformatics. These neural networks ena...
Linear response formulas for the generalized belief propagation in approximate inference are derived by using generalized belief propagation. The linear response formulas can give...
Opposition-based learning as a new scheme for machine intelligence is introduced. Estimates and counter-estimates, weights and opposite weights, and actions versus counter-actions...
The aim of the research presented in this paper is to contribute to reduction of development time for ontologies by discovering reusable parts and patterns. The approach is to use...
Minimal Switching Graph (MSG) is a graphical model for the constrained via minimization problem — a combinatorial optimization problem in integrated circuit design automation. F...