Sciweavers

70 search results - page 13 / 14
» informaticalt 2008
Sort
View
INFORMATICALT
2008
162views more  INFORMATICALT 2008»
13 years 5 months ago
Vague Rough Set Techniques for Uncertainty Processing in Relational Database Model
Abstract. The study of databases began with the design of efficient storage and data sharing techniques for large amount of data. This paper concerns the processing of imprecision ...
Karan Singh, Samajh Singh Thakur, Mangi Lal
INFORMATICALT
2008
120views more  INFORMATICALT 2008»
13 years 5 months ago
Nonlinear Behaviour in the MPI-Parallelised Model of the Rat Somatosensory Cortex
Mammalian brains consisting of up to 1011 neurons belong to group of the most complex systems in the Universe. For years they have been one of the hardest objects of simulation. Th...
Grzegorz M. Wojcik, Wieslaw A. Kaminski
INFORMATICALT
2008
137views more  INFORMATICALT 2008»
13 years 5 months ago
Acoustic Modelling for Croatian Speech Recognition and Synthesis
This paper presents the Croatian context-dependent acoustic modelling used in speech recognition and in speech synthesis. The proposed acoustic model is based on context-dependent ...
Sanda Martincic-Ipsic, Slobodan Ribaric, Ivo Ipsic
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
13 years 5 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 5 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang