Sciweavers

1701 search results - page 242 / 341
» Computer Science and State Machines
Sort
View
GI
2009
Springer
14 years 7 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
STOC
2009
ACM
152views Algorithms» more  STOC 2009»
15 years 4 months ago
Green's conjecture and testing linear-invariant properties
A system of linear equations in p unknowns Mx = b is said to have the removal property if every set S ⊆ {1, . . . , n} which contains o(np− ) solutions of Mx = b can be turned...
Asaf Shapira
FGR
2011
IEEE
244views Biometrics» more  FGR 2011»
14 years 1 months ago
Emotion representation, analysis and synthesis in continuous space: A survey
— Despite major advances within the affective computing research field, modelling, analysing, interpreting and responding to naturalistic human affective behaviour still remains...
Hatice Gunes, Björn Schuller, Maja Pantic, Ro...
IPPS
2007
IEEE
15 years 4 months ago
Babel Remote Method Invocation
Babel is a high-performance, n-way language interoperability tool for the HPC community that now includes support for distributed computing via Remote Method Invocation (RMI). We ...
Gary Kumfert, James Leek, Thomas Epperly
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 4 months ago
On the Lower Bound of Local Optimums in K-Means Algorithm
The k-means algorithm is a popular clustering method used in many different fields of computer science, such as data mining, machine learning and information retrieval. However, ...
Zhenjie Zhang, Bing Tian Dai, Anthony K. H. Tung