Sciweavers

74 search results - page 9 / 15
» How Good is Almost Perfect
Sort
View
138
Voted
TASLP
2011
14 years 9 months ago
Estimating Dominance in Multi-Party Meetings Using Speaker Diarization
—With the increase in cheap commercially available sensors, recording meetings is becoming an increasingly practical option. With this trend comes the need to summarize the recor...
Hayley Hung, Yan Huang, Gerald Friedland, Daniel G...
124
Voted
ICRA
2007
IEEE
160views Robotics» more  ICRA 2007»
15 years 9 months ago
CRF-Filters: Discriminative Particle Filters for Sequential State Estimation
Abstract— Particle filters have been applied with great success to various state estimation problems in robotics. However, particle filters often require extensive parameter tw...
Benson Limketkai, Dieter Fox, Lin Liao
DL
1999
Springer
181views Digital Library» more  DL 1999»
15 years 7 months ago
Quality of OCR for Degraded Text Images
Commercial OCR packages work best with highquality scanned images. They often produce poor results when the image is degraded, either because the original itself was poor quality,...
Roger T. Hartley, Kathleen Crumpton
129
Voted
SDM
2009
SIAM
138views Data Mining» more  SDM 2009»
15 years 12 months ago
ShatterPlots: Fast Tools for Mining Large Graphs.
Graphs appear in several settings, like social networks, recommendation systems, computer communication networks, gene/protein biological networks, among others. A deep, recurring...
Ana Paula Appel, Andrew Tomkins, Christos Faloutso...
184
Voted
TCOS
2010
14 years 9 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan