Sciweavers

2421 search results - page 244 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
MOC
1998
108views more  MOC 1998»
15 years 4 months ago
Numerical conformal mapping based on the generalised conjugation operator
Abstract. An iterative procedure for numerical conformal mapping is presented which imposes no restriction on the boundary complexity. The formulation involves two analytically equ...
Bao Cheng Li, Stavros Syngellakis
DATE
2008
IEEE
107views Hardware» more  DATE 2008»
15 years 11 months ago
Built-in Clock Skew System for On-line Debug and Repair
We present a low-cost on-line system for clock skew management in integrated circuits. Our Built-In Clock Skew System (BICSS) uses a centralized approach to identify, quantify and...
Atanu Chattopadhyay, Zeljko Zilic
PAMI
2008
146views more  PAMI 2008»
15 years 4 months ago
Video Event Recognition Using Kernel Methods with Multilevel Temporal Alignment
In this work, we systematically study the problem of event recognition in unconstrained news video sequences. We adopt the discriminative kernel-based method for which video clip s...
Dong Xu, Shih-Fu Chang
AAAI
2008
15 years 7 months ago
Adaptive Importance Sampling with Automatic Model Selection in Value Function Approximation
Off-policy reinforcement learning is aimed at efficiently reusing data samples gathered in the past, which is an essential problem for physically grounded AI as experiments are us...
Hirotaka Hachiya, Takayuki Akiyama, Masashi Sugiya...
ECIR
2004
Springer
15 years 6 months ago
Fault-Tolerant Fulltext Information Retrieval in Digital Multilingual Encyclopedias with Weighted Pattern Morphing
This paper introduces a new approach to add fault-tolerance to a fulltext retrieval system. The weighted pattern morphing technique circumvents some of the disadvantages of the wid...
Wolfram M. Esser