Sciweavers

1522 search results - page 167 / 305
» Control-Driven Tasks: Modeling and Analysis
Sort
View
ICDAR
2003
IEEE
14 years 3 months ago
Optimizing the Number of States, Training Iterations and Gaussians in an HMM-based Handwritten Word Recognizer
In off-line handwriting recognition, classifiers based on hidden Markov models (HMMs) have become very popular. However, while there exist well-established training algorithms, s...
Simon Günter, Horst Bunke
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 10 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
COLING
2010
13 years 5 months ago
Near-synonym Lexical Choice in Latent Semantic Space
We explore the near-synonym lexical choice problem using a novel representation of near-synonyms and their contexts in the latent semantic space. In contrast to traditional latent...
Tong Wang, Graeme Hirst
APCHI
2004
IEEE
14 years 1 months ago
Designing for Flow in a Complex Activity
One component of a user's interaction with computer systems is commonly referred to as `flow'. Flow is an important consideration in interactive system design as it enca...
Jon M. Pearce, Steve Howard
CCS
2010
ACM
13 years 10 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt