Sciweavers

6253 search results - page 337 / 1251
» Use Case Modeling Guidelines
Sort
View
OAS
2003
15 years 5 months ago
Using OWL in a Pervasive Computing Broker
Computing is moving toward a pervasive context-aware environment in which agents with limited resources will require external support to help them become context-aware. In this pa...
Harry Chen, Timothy W. Finin, Anupam Joshi
ICPR
2006
IEEE
16 years 5 months ago
On Kernel Selection in Relevance Vector Machines Using Stability Principle
In this paper we propose an alternative interpretation of Bayesian learning based on maximal evidence principle. We establish a notion of local evidence which can be viewed as a c...
Dmitry Kropotov, Nikita Ptashko, Oleg Vasiliev, Dm...
ICPR
2006
IEEE
16 years 5 months ago
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis
In this paper, we apply a multiple regression method based on Canonical Correlation Analysis (CCA) to face data modelling. CCA is a factor analysis method which exploits the corre...
Michael Reiter, Rene Donner, Georg Langs, Horst Bi...
AICCSA
2007
IEEE
120views Hardware» more  AICCSA 2007»
15 years 10 months ago
Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks
:- A software product spends more than 65% of its lifecycle in maintenance. Software systems with good maintainability can be easily modified to fix faults. In this paper, we adapt...
Walid Abdelmoez, Katerina Goseva-Popstojanova, Han...
ICC
2007
IEEE
178views Communications» more  ICC 2007»
15 years 10 months ago
Closed-Form BER Expressions for BPSK Using MRC with Multiple Interferers in Arbitrarily Correlated Rayleigh Fading
— An exact and closed-form expression for the average bit error rate (BER) of coherent binary phase-shift keying (BPSK) using maximal ratio combining (MRC) in the presence of mul...
Xiaodi Zhang, Norman C. Beaulieu