Sciweavers

5948 search results - page 315 / 1190
» Computing Robust Counter-Strategies
Sort
View
120
Voted
EUSFLAT
2001
127views Fuzzy Logic» more  EUSFLAT 2001»
15 years 6 months ago
Soft computing in investment appraisal
Standard financial techniques neglect extreme situations and regards large market shifts as too unlikely to matter. Such approach accounts for what occurs most of the time in the ...
Antoaneta Serguieva, John Hunter, Tatiana Kalganov...
144
Voted
NAACL
1994
15 years 5 months ago
Predicting and Managing Spoken Disfluencies During Human-Computer Interaction
This research characterizes the spontaneous spoken disfluencies typical of human-computer interaction, and presents a predictive model accounting for their occurrence. Data were c...
Sharon L. Oviatt
CORR
2006
Springer
133views Education» more  CORR 2006»
15 years 4 months ago
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing
Abstract-- Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc....
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin,...
IPTPS
2004
Springer
15 years 10 months ago
Supporting Heterogeneity and Congestion Control in Peer-to-Peer Multicast Streaming
Abstract— We consider the problem of supporting bandwidth heterogeneity and congestion control in the context of P2P multicast streaming. We identify several challenges peculiar ...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...
ICPR
2010
IEEE
15 years 3 months ago
3D Vertebrae Segmentation in CT Images with Random Noises
Exposure levels (X-ray tube amperage and peak kilovoltage) are associated with various noise levels and radiation dose. When higher exposure levels are applied, the images have hi...
Melih Seref Aslan