Sciweavers

2006 search results - page 133 / 402
» Heuristic Security-Testing Methods
Sort
View
ACL
1997
15 years 2 months ago
Decoding Algorithm in Statistical Machine Translation
Decoding algorithm is a crucial part in statistical machine translation. We describe a stack decoding algorithm in this paper. We present the hypothesis scoring method and the heu...
Ye-Yi Wang, Alex Waibel
71
Voted
KES
2006
Springer
15 years 21 days ago
Mathematical Formulation of a Type of Hierarchical Neurofuzzy System
Abstract. This paper presents a class of hierarchical fuzzy system applied to a cigar classification system. The weight, texture and chromatic characteristics are used to classify ...
Omar Sánchez, Sixto Romero, Francisco J. Mo...
108
Voted
TCOS
2008
15 years 20 days ago
On Reduct Construction Algorithms
This paper critically analyzes reduct construction methods evels. At a high level, one can abstract commonalities from the existing algorithms, and classify them into three basic g...
Yiyu Yao, Yan Zhao, Jue Wang
IJON
2000
81views more  IJON 2000»
15 years 17 days ago
Initialization by selection for wavelet network training
We present an original initialization procedure for the parameters of feedforward wavelet networks, prior to training by gradient-based techniques. It takes advantage of wavelet f...
Yacine Oussar, Gérard Dreyfus
86
Voted
ICML
2002
IEEE
16 years 1 months ago
Interpreting and Extending Classical Agglomerative Clustering Algorithms using a Model-Based approach
We present two results which arise from a model-based approach to hierarchical agglomerative clustering. First, we show formally that the common heuristic agglomerative clustering...
Sepandar D. Kamvar, Dan Klein, Christopher D. Mann...