Sciweavers

1396 search results - page 255 / 280
» Composing Adaptive Learning Systems
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 8 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
ATAL
2003
Springer
14 years 26 days ago
Providing Effective Access to Shared Resources: A COIN Approach
Managers of systems of shared resources typically have many separate goals. Examples are efficient utilization of the resources among its users and ensuring no user’s satisfacti...
Stéphane Airiau, Sandip Sen, David Wolpert,...
PAMI
2007
194views more  PAMI 2007»
13 years 7 months ago
Robust Object Tracking Via Online Dynamic Spatial Bias Appearance Models
This paper presents a robust object tracking method via a spatial bias appearance model learned dynamically in video. Motivated by the attention shifting among local regions of a ...
Datong Chen, Jie Yang
ICASSP
2011
IEEE
12 years 11 months ago
Use of VTL-wise models in feature-mapping framework to achieve performance of multiple-background models in speaker verification
Recently, Multiple Background Models (M-BMs) [1, 2] have been shown to be useful in speaker verification, where the M-BMs are formed based on different Vocal Tract Lengths (VTLs)...
Achintya Kumar Sarkar, Srinivasan Umesh
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
14 years 27 days ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim