Sciweavers

2747 search results - page 396 / 550
» Non-oblivious Strategy Improvement
Sort
View
IPM
2006
100views more  IPM 2006»
14 years 11 months ago
Automatic indexing of online health resources for a French quality controlled gateway
The profusion of online resources calls for tools and methods to help Internet users find precisely what they are looking for. Quality controlled gateway CISMeF provides such serv...
Aurélie Névéol, Alexandrina R...
JUCS
2008
155views more  JUCS 2008»
14 years 11 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
JIS
2006
114views more  JIS 2006»
14 years 11 months ago
Working with information: information management and culture in a professional services organization
The paper presents a case study of a large Canadian law firm with a distinctive information culture that is vigorously implementing an information management strategy. Our finding...
Chun Wei Choo, Colin Furness, Scott Paquette, Herm...
ML
2006
ACM
113views Machine Learning» more  ML 2006»
14 years 11 months ago
Learning to bid in bridge
Bridge bidding is considered to be one of the most difficult problems for game-playing programs. It involves four agents rather than two, including a cooperative agent. In additio...
Asaf Amit, Shaul Markovitch
TDSC
2008
125views more  TDSC 2008»
14 years 11 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar