Sciweavers

2015 search results - page 62 / 403
» Hidden Software Capabilities
Sort
View
MHCI
2009
Springer
14 years 3 months ago
SeCuUI: autocomplete your terminal input
With SeCuUI we present a solution that aims to increase security of data entry on public terminals. The user can enter all data requested by the terminal using her mobile device. ...
Max-Emanuel Maurer, Alexander De Luca
ICPR
2008
IEEE
14 years 3 months ago
Spam filtering with several novel bayesian classifiers
In this paper, we report our work on spam filtering with three novel bayesian classification methods: Aggregating One-Dependence Estimators (AODE), Hidden Naïve Bayes (HNB), Loca...
Chuanliang Chen, Yingjie Tian, Chunhua Zhang
IROS
2008
IEEE
142views Robotics» more  IROS 2008»
14 years 3 months ago
Scaffolding on-line segmentation of full body human motion patterns
Abstract— This paper develops an approach for on-line segmentation of whole body human motion patterns during human motion observation and learning. A Hidden Markov Model is used...
Dana Kulic, Yoshihiko Nakamura
ICIP
2007
IEEE
14 years 3 months ago
Steganalyzing Texture Images
A texture image is of noisy nature in its spatial representation. As a result, the data hidden in texture images, in particular in raw texture images, are hard to detect with curr...
Chunhua Chen, Yun Q. Shi, Guorong Xuan
ICANN
2007
Springer
14 years 3 months ago
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
Abstract. Keyword spotting is a detection task consisting in discovering the presence of specific spoken words in unconstrained speech. The majority of keyword spotting systems ar...
Santiago Fernández, Alex Graves, Jürge...