Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Graham Tattersall"'
Autor:
César González-Pola, Timothy J Smyth, Kjell Arne Mork, N. Penny Holliday, Stephen Dye, Solfrid Sætre Hjøllo, Graham Tattersall, Roger Proctor, J.F. Read, Jason Holt, S.L. Hughes, Theresa Shammon, Karen Helen Wiltshire, Sarah Wakelin, Ben A. Ward, Joanne Hopkins, Toby Sherwin, Glen Nolan
Publikováno v:
e-IEO. Repositorio Institucional Digital de Acceso Abierto del Instituto Español de Oceanografía
instname
Progress in Oceanography
instname
Progress in Oceanography
We examine the trends and variability in temperature of the northwest European shelf seas over the period 1960–2004 using four approaches: a regional model simulation (using the Proudman Oceanographic Laboratory Coastal Ocean Modelling System; POLC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1aef2ce1fd3906ecda2157625b9506c4
http://hdl.handle.net/10508/8449
http://hdl.handle.net/10508/8449
Publikováno v:
Speech Communication. 13:417-425
This paper outlines four novel methods for the task of speaker verification. The first model, a Hybrid Multi-Layer Perception (MLP)-Radial Basis Function (RBF) model, is an MLP predictor whose weights are then used as inputs to an RBF classifier for
Autor:
Jianhong Jin, Martin J. Russell, Michael J. Carey, James Chapman, Harvey Lloyd-Thomas, Graham Tattersall
Publikováno v:
8th European Conference on Speech Communication and Technology (Eurospeech 2003).
Publikováno v:
5th International Conference on Spoken Language Processing (ICSLP 1998).
Autor:
P. R. Limb, Graham Tattersall
Publikováno v:
Computer Aided Decision Support in Telecommunications ISBN: 9789401065245
Data mining is a term which has become popular to describe a number of techniques for the exploration and exploitation of data. In particular, a large part of data mining involves the visualization of data and subsequent utilization of machine-learni
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::57580d25fb08332eb9dee9f0ea60af0f
https://doi.org/10.1007/978-94-009-0081-3_4
https://doi.org/10.1007/978-94-009-0081-3_4
Publikováno v:
IEE Proceedings - Vision, Image, and Signal Processing. 150:383
Biometrics using inherited characteristics are frequently used in security systems. An alternative metric is user behaviour. Examples of user behaviour are the set of web pages accessed over a number of Internet sessions, or, the set of television pr
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.