Sciweavers

1566 search results - page 83 / 314
» Contification Using Dominators
Sort
View
IJCINI
2008
107views more  IJCINI 2008»
14 years 9 months ago
Artificial Neural Networks that Classify Musical Chords
An artificial neural network was trained to classify musical chords into four categories--major, dominant seventh, minor, or diminished seventh--independent of musical key. After ...
Vanessa Yaremchuk, Michael R. W. Dawson
INFORMS
2008
62views more  INFORMS 2008»
14 years 9 months ago
Edge Finding for Cumulative Scheduling
Edge-finding algorithms for cumulative scheduling are at the core of commercial constraint-based schedulers. This paper shows that Nuijten's edge finder for cumulative schedu...
Luc Mercier, Pascal Van Hentenryck
MVA
2008
140views Computer Vision» more  MVA 2008»
14 years 9 months ago
An occlusion metric for selecting robust camera configurations
Vision based tracking systems for surveillance and motion capture rely on a set of cameras to sense the environment. The exact placement or configuration of these cameras can have...
Xing Chen, James Davis
COLING
2002
14 years 9 months ago
A Graph Model for Unsupervised Lexical Acquisition
This paper presents an unsupervised method for assembling semantic knowledge from a part-ofspeech tagged corpus using graph algorithms. The graph model is built by linking pairs o...
Dominic Widdows, Beate Dorow
IJISEC
2008
188views more  IJISEC 2008»
14 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...