In an on-line transaction, a user sends her personal sensitive data (e.g., password) to a server for authentication. This process is known as Single Sign-On (SSO). Subject to phish...
Machine learning with few training examples always leads to over-fitting problems, whereas human individuals are often able to recognize difficult object categories from only one ...
- The emergence of middleware solutions and new services even on small devices will need adapted distributed management solutions which address these specificities, both in terms o...
Using computers for different task including enhancement, description and evaluation of signals we typically include three steps: signal processing (for obtaining signal of better ...
We examine the utility of multiple types of turn-level and contextual linguistic features for automatically predicting student emotions in human-human spoken tutoring dialogues. W...