Sciweavers

3556 search results - page 633 / 712
» Can machine learning be secure
Sort
View
ROMAN
2007
IEEE
179views Robotics» more  ROMAN 2007»
14 years 4 months ago
Online Affect Detection and Adaptation in Robot Assisted Rehabilitation for Children with Autism
–This paper presents a novel affect-sensitive human-robot interaction framework for rehabilitation of children with autism spectrum disorder (ASD) where the robot can detect the ...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
SEMCO
2007
IEEE
14 years 4 months ago
Unrestricted Coreference: Identifying Entities and Events in OntoNotes
Most research in the field of anaphora or coreference detection has been limited to noun phrase coreference, usually on a restricted set of entities, such as ACE entities. In par...
Sameer S. Pradhan, Lance A. Ramshaw, Ralph M. Weis...
SMC
2007
IEEE
143views Control Systems» more  SMC 2007»
14 years 4 months ago
Enabling gestural interaction by means of tracking dynamical systems models and assistive feedback
— The computational understanding of continuous human movement plays a significant role in diverse emergent applications in areas ranging from human computer interaction to phys...
Yon Visell, Jeremy R. Cooperstock
AIHC
2007
Springer
14 years 4 months ago
Instinctive Computing
Instinctive computing is a computational simulation of biological and cognitive instincts. It is a meta-program of life, just like universal gravity in nature. It profoundly influe...
Yang Cai
CIA
2007
Springer
14 years 4 months ago
Quantifying the Expected Utility of Information in Multi-agent Scheduling Tasks
Abstract. In this paper we investigate methods for analyzing the expected value of adding information in distributed task scheduling problems. As scheduling problems are NP-complet...
Avi Rosenfeld, Sarit Kraus, Charlie Ortiz