 |
|
 Mathematical Models of Spoken LanguageHumans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,... |  |  Neural Network Modeling: Statistical Mechanics and Cybernetic PerspectivesNeural Network Modeling offers a cohesive approach to the statistical mechanics and principles of cybernetics as a basis for neural network modeling. It brings together neurobiologists and the engineers who design intelligent automata to understand the physics of collective behavior pertinent to neural elements and the self-control aspects of... |  |  The SPIN Model Checker: Primer and Reference ManualSPIN is the world's most popular, and arguably one of the world's most powerful, tools for detecting software defects in concurrent system designs. Literally thousands of people have used SPIN since it was first introduced almost fifteen years ago. The tool has been applied to everything from the verification of complex call processing... |
|
|
 Knowledge-Based NeurocomputingNeurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based... |  |  Dynamics of Complex Systems (Studies in Nonlinearity)The study of complex systems in a unified framework has become recognized in recent years as a new scientific discipline, the ultimate in the interdisciplinary fields. Breaking down the barriers between physics, chemistry, and biology and the so-called soft sciences of psychology, sociology, economics and anthropology, this text explores the... |  |  Disruptive Security Technologies with Mobile Code and Peer-to-Peer NetworksThe traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities... |
|
 Myths About Doing Business in ChinaChina has always been a land of myth, mystery and exaggeration for the West.
Marco Polo came back to thirteenth-century Venice with tales of cities of a million people (unheard of in those days), unimaginable wealth, exotic food and strange customs. Eighteenth-century adventurers bought tales of rulers enlightened by the wise words of... |  |  Introduction to Constraint DatabasesConstraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in... |  |  System-on-Chip Test Architectures (Systems on Silicon)Modern electronics testing has a legacy of more than 40 years. The introduction of new technologies, especially nanometer technologies with 90nm or smaller geometry, has allowed the semiconductor industry to keep pace with the increased performance-capacity demands from consumers. As a result, semiconductor test costs have been growing steadily... |
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |