The primary constraint in the effective mining of data streams is the large volume of data which must be processed in real time. In many cases, it is desirable to store a summary...
This paper discusses the evaluation of the electronic cash counterfeit threat scenarios using micro dynamic simulation. This modeling technique provides information needed for the...
Kazuo J. Ezawa, Gregory Napiorkowski, Mariusz Koss...
We describe a new method for pruning in dynamic models based on running an adaptive filtering algorithm online during decoding to predict aspects of the scores in the near future....
Under Legg’s and Hutter’s formal measure [1], performance in easy environments counts more toward an agent’s intelligence than does performance in difficult environments. An ...
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...