Sciweavers

1687 search results - page 68 / 338
» Which pointer analysis should I use
Sort
View
133
Voted
ICASSP
2011
IEEE
14 years 7 months ago
An extension of the ICA model using latent variables
The Independent Component Analysis (ICA) model is extended to the case where the components are not necessarily independent: depending on the value a hidden latent process at the ...
Selwa Rafi, Marc Castella, Wojciech Pieczynski
154
Voted
ICDAR
2011
IEEE
14 years 3 months ago
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes
—This paper proposes a method for low resolution QR-code recognition. A QR-code is a two-dimensional binary symbol that can embed various information such as characters and numbe...
Yuji Kato, Daisuke Deguchi, Tomokazu Takahashi, Ic...
129
Voted
DRR
2009
15 years 1 months ago
Using synthetic data safely in classification
When is it safe to use synthetic data in supervised classification? Trainable classifier technologies require large representative training sets consisting of samples labeled with...
Jean Nonnemaker, Henry Baird
190
Voted
SBRN
2008
IEEE
15 years 10 months ago
Multi-label Text Categorization Using VG-RAM Weightless Neural Networks
In automated multi-label text categorization, an automatic categorization system should output a category set, whose size is unknown a priori, for each document under analysis. Ma...
Claudine Badue, Felipe Pedroni, Alberto Ferreira d...
181
Voted
TSE
2011
134views more  TSE 2011»
14 years 10 months ago
Verifying the Evolution of Probability Distributions Governed by a DTMC
— We propose a new probabilistic temporal logic iLTL which captures properties of systems whose state can be represented by probability mass functions (pmf’s). Using iLTL, we c...
YoungMin Kwon, Gul A. Agha