Sciweavers

319 search results - page 55 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Training of error-corrective model for ASR without using audio data
This paper introduces a method to train an error-corrective model for Automatic Speech Recognition (ASR) without using audio data. In existing techniques, it is assumed that sufï¬...
Gakuto Kurata, Nobuyasu Itoh, Masafumi Nishimura
SAC
2011
ACM
14 years 13 days ago
Biomedical concept extraction based on combining the content-based and word order similarities
It is well known that the main objective of conceptual retrieval models is to go beyond simple term matching by relaxing term independence assumption through concept recognition. ...
Duy Dinh, Lynda Tamine
DCG
1998
59views more  DCG 1998»
14 years 9 months ago
A Probabilistic Analysis of the Power of Arithmetic Filters
The assumption of real-number arithmetic, which is at the basis of conventional geometric algorithms, has been seriously challenged in recent years, since digital computers do not...
Olivier Devillers, Franco P. Preparata
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Single Buyer-Single Supplier Bargaining Problem with Asymmetric Information - Theoretical Approach and Software Implementation
This paper is focused on the coordination of order and production policy between buyers and suppliers in supply chains. When a buyer and a supplier of an item work independently, ...
Eric Sucky
CDC
2010
IEEE
183views Control Systems» more  CDC 2010»
14 years 4 months ago
Application of potent potential functions in eye/head movement control
In this paper we study the human eye movement and the head movement system as a simple mechanical control system. Most of the time, eye movements obey Listing's constraint, wh...
Bijoy K. Ghosh, Indika Wijayasinghe