Sciweavers

752 search results - page 106 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
130
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Full-covariance UBM and heavy-tailed PLDA in i-vector speaker verification
In this paper, we describe recent progress in i-vector based speaker verification. The use of universal background models (UBM) with full-covariance matrices is suggested and tho...
Pavel Matejka, Ondrej Glembek, Fabio Castaldo, M. ...
136
Voted
AMDO
2006
Springer
15 years 7 months ago
Shape-Motion Based Athlete Tracking for Multilevel Action Recognition
An automatic human shape-motion analysis method based on a fusion architecture is proposed for human action recognition in videos. Robust shape-motion features are extracted from h...
Costas Panagiotakis, Emmanuel Ramasso, Georgios Tz...
153
Voted
COLING
2010
14 years 10 months ago
Near-synonym Lexical Choice in Latent Semantic Space
We explore the near-synonym lexical choice problem using a novel representation of near-synonyms and their contexts in the latent semantic space. In contrast to traditional latent...
Tong Wang, Graeme Hirst
146
Voted
MSWIM
2009
ACM
15 years 10 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
152
Voted
ATAL
2009
Springer
15 years 10 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...