Sciweavers

7106 search results - page 1336 / 1422
» Restricted Complexity, General Complexity
Sort
View
150
Voted
CIKM
2007
Springer
15 years 7 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
COMPGEOM
2007
ACM
15 years 7 months ago
Guard placement for efficient point-in-polygon proofs
We consider the problem of placing a small number of angle guards inside a simple polygon P so as to provide efficient proofs that any given point is inside P. Each angle guard vi...
David Eppstein, Michael T. Goodrich, Nodari Sitchi...
COMPSAC
2007
IEEE
15 years 7 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
DEBS
2007
ACM
15 years 7 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...
APGV
2010
ACM
266views Visualization» more  APGV 2010»
15 years 7 months ago
Horizon estimation: perceptual and computational experiments
The human visual system is able to quickly and robustly infer a wealth of scene information – the scene "gist" – already after 100 milliseconds of image presentation...
Christian Herdtweck, Christian Wallraven
« Prev « First page 1336 / 1422 Last » Next »