Sciweavers

1414 search results - page 121 / 283
» Combining Intruder Theories
Sort
View
100
Voted
PR
2006
88views more  PR 2006»
15 years 21 days ago
Directional features in online handwriting recognition
The selection of valuable features is crucial in pattern recognition. In this paper we deal with the issue that part of features originate from directional instead of common linea...
Claus Bahlmann
IPM
2000
142views more  IPM 2000»
15 years 17 days ago
Adapting a diagnostic problem-solving model to information retrieval
In this paper, a competition-based connectionist model for diagnostic problem-solving is adapted to information retrieval. In this model, we treat documents as \disorders" an...
Inien Syu, Sheau-Dong Lang
JMIV
2002
172views more  JMIV 2002»
15 years 13 days ago
Grey-Scale Morphology Based on Fuzzy Logic
There exist several methods to extend binary morphology to grey-scale images. One of these methods is based on fuzzy logic and fuzzy set theory. Another approach starts from the c...
Ting-Quan Deng, Henk J. A. M. Heijmans
132
Voted
JMIV
1998
93views more  JMIV 1998»
15 years 13 days ago
Connectivity on Complete Lattices
Classically, connectivity is a topological notion for sets, often introduced by means of arcs. A non topological axiomatics has been proposed by Matheron and Serra. The present pa...
Jean Serra
128
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 10 days ago
Non-atomic Games for Multi-User Systems
Abstract—In this contribution, the performance of a multiuser system is analyzed in the context of frequency selective fading channels. Using game theoretic tools, a useful frame...
Nicolas Bonneau, Mérouane Debbah, Eitan Alt...