Sciweavers

761 search results - page 73 / 153
» Concise and Consistent Naming
Sort
View
EDBTW
2010
Springer
14 years 5 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
SETN
2010
Springer
14 years 5 months ago
Feature Selection for Improved Phone Duration Modeling of Greek Emotional Speech
In the present work we address the problem of phone duration modeling for the needs of emotional speech synthesis. Specifically, relying on ten well known machine learning techniqu...
Alexandros Lazaridis, Todor Ganchev, Iosif Mporas,...
PERVASIVE
2009
Springer
14 years 5 months ago
PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building
We present a system, called PL-Tags, for detecting the presence of batteryless tags in a building or home through the power lines. The excitation (or interrogation) and detection o...
Shwetak N. Patel, Erich P. Stuntebeck, Thomas Robe...
ICRA
2009
IEEE
166views Robotics» more  ICRA 2009»
14 years 4 months ago
Laser-based geometric modeling using cooperative multiple mobile robots
— In order to construct three-dimensional shape models of large-scale architectural structures using a laser range finder, a number of range images are taken from various viewpo...
Ryo Kurazume, Yusuke Noda, Yukihiro Tobata, Kai Li...
WEBDB
2009
Springer
115views Database» more  WEBDB 2009»
14 years 4 months ago
A Machine Learning Approach to Foreign Key Discovery
We study the problem of automatically discovering semantic associations between schema elements, namely foreign keys. This problem is important in all applications where data sets...
Alexandra Rostin, Oliver Albrecht, Jana Bauckmann,...