Sciweavers

Share
INFORMATICALT
2008
122views more  INFORMATICALT 2008»
9 years 7 months ago
Modeling Phone Duration of Lithuanian by Classification and Regression Trees, using Very Large Speech Corpus
Classification and regression tree approach was used in this research to model phone duration of Lithuanian. 300 thousand samples of vowels and 400 thousand samples of consonants e...
Giedrius Norkevicius, Gailius Raskinis
INFORMATICALT
2006
110views more  INFORMATICALT 2006»
9 years 8 months ago
Estimation of Functional Ranges Using Standard and Inner Interval Arithmetic
New ways to estimate ranges of values of functions from standard and inner interval arithmetic have been proposed. Using the proposed ways ranges of values of mathematical test fun...
Julius Zilinskas
INFORMATICALT
2006
89views more  INFORMATICALT 2006»
9 years 8 months ago
Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1
The objective is to investigate two emerging information technologies in graduate studies and scientific cooperation. Internet is the first technology. The open source is the secon...
Jonas Mockus
INFORMATICALT
2006
115views more  INFORMATICALT 2006»
9 years 8 months ago
Sequent Calculi for Temporal Logics of Common Knowledge and Belief
In this paper we consider two logics: temporal logic of common knowledge and temporal logic of common belief. These logics involve the discrete time linear temporal logic operators...
Jurate Sakalauskaite
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
9 years 8 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
INFORMATICALT
2006
364views more  INFORMATICALT 2006»
9 years 8 months ago
A Copyright Protection using Watermarking Algorithm
In this paper, a digital watermarking algorithm for copyright protection based on the concept of embed digital watermark and modifying frequency coefficients in discrete wavelet tr...
Aboul Ella Hassanien
INFORMATICALT
2006
86views more  INFORMATICALT 2006»
9 years 8 months ago
Methodology to Evaluate the Functionality of Specification Languages
The paper proposes a methodology for evaluation of specification language functionality characteristics. It describes background of the proposed methodology, discusses the methodol...
Jelena Gasperovic, Albertas Caplinskas
INFORMATICALT
2006
154views more  INFORMATICALT 2006»
9 years 8 months ago
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors
Matrix transpose in parallel systems typically involves costly all-to-all communications. In this paper, we provide a comparative characterization of various efficient algorithms f...
Rami Al Na'mneh, W. David Pan, Seong-Moo Yoo
INFORMATICALT
2006
129views more  INFORMATICALT 2006»
9 years 8 months ago
On the Identification of Hammerstein Systems Having Saturation-like Functions with Positive Slopes
Abstract. The aim of the given paper is the development of an approach for parametric identification of Hammerstein systems with piecewise linear nonlinearities, i.e., when the sat...
Rimantas Pupeikis
INFORMATICALT
2006
117views more  INFORMATICALT 2006»
9 years 8 months ago
Job Sequencing with Exponential Functions of Processing Times
We study single machine scheduling problems, where processing times of the jobs are exponential functions of their start times. For increasing functions, we prove strong NP-hardnes...
Adam Janiak, Mikhail Y. Kovalyov
books