Sciweavers

411 search results - page 58 / 83
» Extracting Temporal Information from Short Messages
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 9 days ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
CEAS
2006
Springer
13 years 10 months ago
Introducing the Webb Spam Corpus: Using Email Spam to Identify Web Spam Automatically
Just as email spam has negatively impacted the user messaging experience, the rise of Web spam is threatening to severely degrade the quality of information on the World Wide Web....
Steve Webb, James Caverlee, Calton Pu
JNW
2008
101views more  JNW 2008»
13 years 6 months ago
Micro-controller based Remote Monitoring using Mobile through Spoken Commands
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...
HUC
2004
Springer
14 years 4 days ago
WatchMe: Communication and Awareness Between Members of a Closely-Knit Group
WatchMe is a personal communicator with context awareness in a wristwatch form; it is meant to keep intimate friends and family always connected via awareness cues and text, voice ...
Natalia Marmasse, Chris Schmandt, David Spectre
ICML
2010
IEEE
13 years 7 months ago
3D Convolutional Neural Networks for Human Action Recognition
We consider the fully automated recognition of actions in uncontrolled environment. Most existing work relies on domain knowledge to construct complex handcrafted features from in...
Shuiwang Ji, Wei Xu, Ming Yang, Kai Yu