Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Andonie, Razvan
Transylvania University
Brasov, Romania
  Follow this Reviewer
Date Reviewed  
- 9 of 9 reviews

  Pattern recognition and image analysis
Gose E., Johnsonbaugh R., Jost S.,  Prentice-Hall, Inc., Upper Saddle River, NJ, 1996.Type: Book (9780132364157)

Some major topics in pattern recognition are covered in this well-written book. Statistical techniques for classifying objects into categories and neural networks are included. Sufficient material on image analysis is also included, so a person w...

Aug 1 1997  
  The Multiscale Classifier
Lovell B., Bradley A.  IEEE Transactions on Pattern Analysis and Machine Intelligence 18(2): 124-137, 1996. Type: Article

A new rule-based inductive learning algorithm called multiscale classification (MSC) is introduced. As compared with other existing rule-based decision tree classifiers, this algorithm has the following characteristics: learning is incremental, th...

Dec 1 1996  
  Photographic imaging techniques in C++ for Windows and Windows NT
Lindley C.,  John Wiley & Sons, Inc., New York, NY, 1995.Type: Book (9780471115687)

According to the author, “If you are using or contemplating using photographic imaging in a professional Windows application, you need this book!” I agree: this book is practical, understandable, and well written....

Jul 1 1996  
  Building a secure computer system
Gasser M.,  Van Nostrand Reinhold Co., New York, NY, 1988.Type: Book (9780442230227)

Whenever a specific domain acquires some maturity, a representative monograph appears that marks this stage. This reference work of technical solutions to computer security problems accomplishes such a task. The topics it covers include design tec...

Aug 1 1989  
  Cryptosystems for picture languages
Siromoney R., Subramanian K., Jeyanthi A.,  Springer-Verlag New York, Inc., New York, NY, 1988.Type: Book (9780387192093)

The construction of a public key cryptosystem is based on the idea of a trapdoor. Without the secret information in the trapdoor, the cryptanalyst who only has the public information finds it difficult to decode a ciphertext. The trapdoor informat...

Aug 1 1989  
  ARIADNE: pattern-directed inference and hierarchical abstraction in protein structure recognition
Lathrop R., Webster T., Smith T.  Communications of the ACM 30(11): 909-921, 1987. Type: Article

ARIADNE, the Cretan princess who helped Theseus find his way out of the labyrinth, is the namesake of a hierarchical pattern-directed inference system for the ill-structured problem area of protein structure analysis. ARIADNE identifies the optima...

Sep 1 1988  
  Toward memory-based reasoning
Stanfill C., Waltz D. (ed)  Communications of the ACM 29(12): 1213-1228, 1986. Type: Article

The memory-based reasoning hypothesis is based on the following assumption: There is no general way to search memory for the best match without examining every element of memory. This paper describes an experimental memory-based reasoning system f...

Aug 1 1987  
  Symbolic uncertain inference: a study of possible modalities
Ganascia J., Kodratoff Y. (ed)  Expert systems 85 (, Univ. of Warwick, Warwick, UK, 1791986. Type: Proceedings

A central problem in automated reasoning is how to cope with uncertainty. The paper describes a methodology for symbolic uncertain inference, making a distinction between uncertain data and uncertain inferences. Uncertainty is represented by highe...

Feb 1 1987  
  An intelligent system can and must use declarative knowledge efficiently
Pitrat J.  Artificial and human intelligence (, Lyon, France, 2801984. Type: Proceedings

The declarative-procedural battle was an important one in Artificial Intelligence (AI). It dissolved rather than being resolved; the result was a much greater respect for the importance of knowledge representation in current AI work....

Jan 1 1986  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy