Sciweavers

897 search results - page 110 / 180
» Identity: How to name it, How to find it
Sort
View
GG
2008
Springer
15 years 2 months ago
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts
Behavior preservation, namely the fact that the behavior of a model is not altered by the transformations, is a crucial property in refactoring. The most common approaches to behav...
Guilherme Rangel, Leen Lambers, Barbara König...
ICASSP
2010
IEEE
15 years 1 months ago
HMM-based sequence-to-frame mapping for voice conversion
Voice conversion can be reduced to a problem to find a transformation function between the corresponding speech sequences of two speakers. Perhaps the most voice conversions meth...
Yu Qiao, Daisuke Saito, Nobuaki Minematsu
AIEDU
2007
85views more  AIEDU 2007»
15 years 1 months ago
Opening up the Interpretation Process in an Open Learner Model
Opening a model of the learner is a potentially complex operation. There are many aspects of the learner that can be modelled, and many of these aspects may need to be opened in di...
Nicolas van Labeke, Paul Brna, Rafael Morales
AROBOTS
2006
174views more  AROBOTS 2006»
15 years 1 months ago
Area measurement of large closed regions with a mobile robot
How can a mobile robot measure the area of a closed region that is beyond its immediate sensing range? This problem, which we name as blind area measurement, is inspired from scout...
Erol Sahin, Sertan Girgin, Emre Ugur
TCS
2008
15 years 1 months ago
On the complexity of real root isolation using continued fractions
We present algorithmic, complexity and implementation results concerning real root isolation of integer univariate polynomials using the continued fraction expansion of real algeb...
Elias P. Tsigaridas, Ioannis Z. Emiris