Sciweavers

347 search results - page 36 / 70
» Some Second Order Set Theory
Sort
View
ICDAR
2003
IEEE
15 years 3 months ago
Integration of Contextual Information in Handwriting Recognition Systems
This paper investigates different strategies allowing integration of contextual information during the feature extraction stage of a cursive handwriting HMM-based recognition syst...
F. Grandidier, Robert Sabourin, Ching Y. Suen
IDMS
2001
Springer
152views Multimedia» more  IDMS 2001»
15 years 2 months ago
Constraint-Based Configuration of Proxylets for Programmable Networks
Applications such as multimedia streaming for mobile users, or video conferencing, require support within the network for transcoding, compression etc. Proxylets running on servers...
Krish T. Krishnakumar, Morris Sloman
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
15 years 1 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens
ALT
2011
Springer
13 years 9 months ago
Deviations of Stochastic Bandit Regret
This paper studies the deviations of the regret in a stochastic multi-armed bandit problem. When the total number of plays n is known beforehand by the agent, Audibert et al. (2009...
Antoine Salomon, Jean-Yves Audibert
KER
2007
90views more  KER 2007»
14 years 9 months ago
PLTOOL: A knowledge engineering tool for planning and learning
AI planning solves the problem of generating a correct and efficient ordered set of instantiated activities, from a knowledge base of generic actions, which when executed will tra...
Susana Fernández, Daniel Borrajo, Raquel Fu...