Sciweavers

686 search results - page 51 / 138
» Bayesian Analysis of Linear Combiners
Sort
View
ICDAR
2009
IEEE
15 years 8 months ago
Rejection Strategies with Multiple Classifiers for Handwritten Character Recognition
With rejection strategies in a handwriting recognition system, we are able to improve the reliability and accuracy of the recognized characters. In this paper, we propose several ...
Xu-Cheng Yin, Hong-Wei Hao, Yun-Feng Tang, Jun Sun...
ICISC
2007
117views Cryptology» more  ICISC 2007»
15 years 2 months ago
Side Channel Attacks on Irregularly Decimated Generators
Abstract. We investigate three side channel attacks on ABSG, a variant of irregularly decimated generators (IDG). The three attacks are timing analysis, phase-shift fault analysis ...
Chuan-Wen Loe, Khoongming Khoo
AGP
1999
IEEE
15 years 5 months ago
Enhancing Sharing for Precision
Regarding the precision of combined domains including Jacobs and Langen's Sharing there is a core of techniques, such as the standard integration with freeness and linearity ...
Roberto Bagnara, Enea Zaffanella, Patricia M. Hill
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
15 years 5 months ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby
IOR
2006
177views more  IOR 2006»
15 years 1 months ago
Combinatorial Benders' Cuts for Mixed-Integer Linear Programming
Mixed-Integer Programs (MIP's) involving logical implications modelled through big-M coefficients, are notoriously among the hardest to solve. In this paper we propose and an...
Gianni Codato, Matteo Fischetti