Sciweavers

1830 search results - page 291 / 366
» Implementing a Tamper-Evident Database System
Sort
View
ICASSP
2010
IEEE
15 years 26 days ago
Multipass strategies for improving accuracy in a voice search application
This paper describes a set of techniques for improving the performance of automated voice search services intended for mobile users accessing these services over a range of portab...
Tianhe Zhang, Richard Rose, Jean Dahan
108
Voted
EOR
2008
116views more  EOR 2008»
15 years 22 days ago
A hybrid neuro-fuzzy analytical approach to mode choice of global logistics management
This paper presents a hybrid neuro-fuzzy methodology to identify appropriate global logistics (GL) operational modes used for global supply chain management. The proposed methodol...
Jiuh-Biing Sheu
98
Voted
ICPR
2002
IEEE
16 years 1 months ago
A Computationally Efficient Approach to Indoor/Outdoor Scene Classification
Prior research in scene classification has shown that high-level information can be inferred from low-level image features. Classification rates of roughly 90% have been reported ...
Navid Serrano, Andreas E. Savakis, Jiebo Luo
96
Voted
WWW
2001
ACM
16 years 1 months ago
A unified constraint model for XML
Integrity constraints are an essential part of a modern schema definition language. They are useful for semantic specification, update consistency control, query optimization, inf...
Gabriel M. Kuper, Jérôme Siméo...
82
Voted
EACL
2009
ACL Anthology
16 years 1 months ago
Improvements in Analogical Learning: Application to Translating Multi-Terms of the Medical Domain
Handling terminology is an important matter in a translation workflow. However, current Machine Translation (MT) systems do not yet propose anything proactive upon tools which ass...
François Yvon, Philippe Langlais, Pierre Zw...