Sciweavers

1466 search results - page 174 / 294
» Completeness of the Authentication Tests
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Using dialogue acts to learn better repair strategies for spoken dialogue systems
Repair or error-recovery strategies are an important design issue in Spoken Dialogue Systems (SDSs) - how to conduct the dialogue when there is no progress (e.g. due to repeated A...
Matthew Frampton, Oliver Lemon
SIPS
2008
IEEE
14 years 2 months ago
Bio-inspired unified model of visual segmentation system for CAPTCHA character recognition
In this paper, we present a bio-inspired unified model to improve the recognition accuracy of character recognition problems for CAPTCHA (Completely Automated Public Turing Test t...
Chi-Wei Lin, Yu-Han Chen, Liang-Gee Chen
GECCO
2007
Springer
215views Optimization» more  GECCO 2007»
14 years 2 months ago
Addressing sampling errors and diversity loss in UMDA
Estimation of distribution algorithms replace the typical crossover and mutation operators by constructing a probabilistic model and generating offspring according to this model....
Jürgen Branke, Clemens Lode, Jonathan L. Shap...
GECCO
2007
Springer
154views Optimization» more  GECCO 2007»
14 years 2 months ago
Finding critical backbone structures with genetic algorithms
This paper introduces the concept of a critical backbone as a minimal set of variables or part of the solution necessary to be within the basin of attraction of the global optimum...
Adam Prügel-Bennett
COMSWARE
2006
IEEE
14 years 2 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...