Sciweavers

1050 search results - page 98 / 210
» Two methods of authenticated positioning
Sort
View
LREC
2010
148views Education» more  LREC 2010»
15 years 3 months ago
POS Multi-tagging Based on Combined Models
In the POS tagging task, there are two kinds of statistical models: one is generative model, such as the HMM, the others are discriminative models, such as the Maximum Entropy Mod...
Yan Zhao, Gertjan van Noord
CORR
2007
Springer
83views Education» more  CORR 2007»
15 years 1 months ago
Sensitivity Analysis of the Orthoglide, a 3-DOF Translational Parallel Kinematic Machine
This paper presents a sensitivity analysis of the Orthoglide, a 3-DOF translational Parallel Kinematic Machine. Two complementary methods are developed to analyze its sensitivity ...
Stéphane Caro, Philippe Wenger, Fouad Benni...
AES
2005
Springer
105views Cryptology» more  AES 2005»
15 years 1 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera
AI
2002
Springer
15 years 1 months ago
Multi-agent oriented constraint satisfaction
This paper presents a multi-agent oriented method for solving CSPs (Constraint Satisfaction Problems). In this method, distributed agents represent variables and a two-dimensional...
Jiming Liu, Han Jing, Yuan Yan Tang
ACL
2010
15 years 14 hour ago
Identifying Text Polarity Using Random Walks
Automatically identifying the polarity of words is a very important task in Natural Language Processing. It has applications in text classification, text filtering, analysis of pr...
Ahmed Hassan, Dragomir R. Radev