Sciweavers

313 search results - page 28 / 63
» Error Correction Based on Verification Techniques
Sort
View
COLING
1996
14 years 11 months ago
A Gradual Refinement Model for A Robust Thai Morphological Analyzer
This work attempts to provide a robust Thai morphological analyzer which can automatically assign the correct part-of-speech tag to the correct word with time and space efficiency...
Asanee Kawtrakul, Chalatip Thumkanon, Thitima Jamj...
73
Voted
BPM
2006
Springer
105views Business» more  BPM 2006»
15 years 1 months ago
Verifying Workflows with Cancellation Regions and OR-Joins: An Approach Based on Reset Nets and Reachability Analysis
When dealing with complex business processes (e.g., in the context of a workflow implementation or the configuration of some process-aware information system), it is important but ...
Moe Thandar Wynn, Wil M. P. van der Aalst, Arthur ...
83
Voted
ISCAS
2005
IEEE
167views Hardware» more  ISCAS 2005»
15 years 3 months ago
Low-power log-MAP turbo decoding based on reduced metric memory access
Due to the powerful error correcting performance, turbo codes have been adopted in many wireless communication standards. Although several low-power techniques have been proposed,...
Dong-Soo Lee, In-Cheol Park
MVA
2007
196views Computer Vision» more  MVA 2007»
14 years 11 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
81
Voted
ICIP
2002
IEEE
15 years 11 months ago
An improved error control paradigm for multimedia transmission over wireless networks
Providing quality-of-service (QoS) guarantees over wireless packet networks requires thorough understanding and quantification of the interactions among the traffic source, the wi...
Mohamed F. Mansour, Abed Elhamid Lawabni, Ahmed H....