Sciweavers

5234 search results - page 311 / 1047
» Method Components - Rationale Revealed
Sort
View
ICHIM
2001
65views more  ICHIM 2001»
15 years 5 months ago
Dating and Authentication of Rembrandt's Etchings with the Help of Computational Intelligence
In this paper it is studied how the analysis of the structure of the paper of Rembrandt's etchings can help determining the authenticity of the etchings and the dates of the ...
Jan C. A. van der Lubbe, Eugene P. van Someren, Ma...
HIS
2003
15 years 5 months ago
Decision Support Systems Using Hybrid Neurocomputing
This paper suggests a decision support system for tactical air combat environment where not much prior information is available about the decision regions. We proposed a combinati...
Cong Tran, Ajith Abraham, Lakhmi C. Jain
VIP
2001
15 years 5 months ago
Web-based Image Authentication Using Invisible Fragile Watermark
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret i...
Yusuk Lim, Changsheng Xu, David Dagan Feng
WSC
2001
15 years 5 months ago
Call center scheduling technology evaluation using simulation
Telemarketers, direct marketing agencies, collection agencies and others whose primary means of customer contact is via the telephone invest considerable sums of money to make the...
Sandeep Gulati, Scott A. Malcolm
ACL
1998
15 years 5 months ago
Deriving the Predicate-Argument Structure for a Free Word Order Language
In relatively free word order languages, grammatical functions are intricately related to case marking. Assuming an ordered representation of the predicate-argument structure, thi...
Cem H. Bozsahin