Sciweavers

2269 search results - page 421 / 454
» Behavioral Intrusion Detection
Sort
View
WWW
2011
ACM
13 years 4 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
JDCTA
2010
171views more  JDCTA 2010»
13 years 4 months ago
Computer Interaction System using Hand Posture Identification
Natural and friendly interface is critical for the development of service robots. Gesture-based interface offers a way to enable untrained users to interact with robots more easil...
Sushma D. Ghode, S. A. Chhabria, R. V. Dharaskar
TWC
2010
13 years 4 months ago
Toward network coding-based protocols for data broadcasting in wireless Ad Hoc networks
In this paper we consider practical dissemination algorithms exploiting network coding for data broadcasting in ad hoc wireless networks. For an efcient design, we analyze issues r...
Alfred Asterjadhi, Elena Fasolo, Michele Rossi, J&...
JAISE
2011
238views more  JAISE 2011»
13 years 4 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
ICASSP
2011
IEEE
13 years 1 months ago
Further analysis of latent affective mapping for naturally expressive speech synthesis
An essential step in the generation of expressive speech synthesis is the automatic detection and classification of emotions most likely to be present in textual input. At last I...
Jerome R. Bellegarda