Sciweavers

2250 search results - page 61 / 450
» Authorizing applications in singularity
Sort
View
PR
2011
14 years 4 months ago
A variational Bayesian methodology for hidden Markov models utilizing Student's-t mixtures
The Student’s-t hidden Markov model (SHMM) has been recently proposed as a robust to outliers form of conventional continuous density hidden Markov models, trained by means of t...
Sotirios Chatzis, Dimitrios I. Kosmopoulos
ICASSP
2011
IEEE
14 years 1 months ago
Natural gradient approach in orthogonal matrix optimization using cayley transform
Matrix optimization with orthogonal constraints appear in a variety of application fields including signal and image processing. Several researchers have developed algorithms for...
Gen Hori
DDEP
2000
Springer
15 years 2 months ago
A Link-Oriented Comparison of Hyperdocuments and Programs
There are parallels between the construction of programs and the construction of hypertexts, and in ar between the abstractions available to the application programmer and those a...
Heather Brown, Peter J. Brown, Les Carr, Wendy Hal...
ISSRE
2005
IEEE
15 years 3 months ago
Helping End-Users "Engineer" Dependable Web Applications
End-user programmers are increasingly relying on web authoring environments to create web applications. Although often consisting primarily of web pages, such applications are inc...
Sebastian G. Elbaum, Kalyan-Ram Chilakamarri, Bhuv...
IEEEARES
2006
IEEE
15 years 3 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger