Sciweavers

1626 search results - page 127 / 326
» Subtyping with Power Types
Sort
View
ICASSP
2010
IEEE
15 years 4 months ago
Phone recognition using Restricted Boltzmann Machines
For decades, Hidden Markov Models (HMMs) have been the state-of-the-art technique for acoustic modeling despite their unrealistic independence assumptions and the very limited rep...
Abdel-rahman Mohamed, Geoffrey E. Hinton
IJMMS
2006
82views more  IJMMS 2006»
15 years 4 months ago
Scale transformations and information presentation in supervisory control
For human operators supervising a complex system it is crucial to have a powerful and flexible information presentation system. In order to reduce the cognitive load operators oft...
Johannes Petersen, Michael May
IAJIT
2010
97views more  IAJIT 2010»
15 years 2 months ago
Prolonging Network Lifetime and Data Accumulation in Heterogeneous Sensor Networks
: Research on Wireless Sensor Networks has often assumed homogeneous nodes. In reality, homogeneous nodes have different capabilities like different levels of initial energy and dr...
Dilip Kumar, Ram Patel, Trilok C. Aseri
VLDB
2007
ACM
105views Database» more  VLDB 2007»
16 years 4 months ago
Using a distributed quadtree index in peer-to-peer networks
Abstract Peer-to-peer (P2P) networks have become a powerful means for online data exchange. Currently, users are primarily utilizing these networks to perform exact-match queries a...
Egemen Tanin, Aaron Harwood, Hanan Samet
OOPSLA
2009
Springer
15 years 10 months ago
Thorn: robust, concurrent, extensible scripting on the JVM
Scripting languages enjoy great popularity due their support for rapid and exploratory development. They typically have lightweight syntax, weak data privacy, dynamic typing, powe...
Bard Bloom, John Field, Nathaniel Nystrom, Johan &...