Sciweavers

2564 search results - page 464 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
HRI
2006
ACM
14 years 1 months ago
Using context and sensory data to learn first and second person pronouns
We present a method of grounded word learning that is powerful enough to learn the meanings of first and second person pronouns. The model uses the understood words in an utteran...
Kevin Gold, Brian Scassellati
CW
2003
IEEE
14 years 1 months ago
Development of a recommendation system with multiple subjective evaluation process models
Current BtoC recommendation services utilize consumers’ purchased log as criteria for selecting information, yet it includes little information of the reason why he bought the i...
Emi Yano, Emi Sueyoshi, Isao Shinohara, Toshikazu ...
IWINAC
2011
Springer
12 years 11 months ago
Design of Social Agents
Abstract. Social behavior, as compared to the egoistic and rational behavior, is known to be more beneficial to groups of subjects and even to individual members of a group. For t...
Roman Gorbunov, Emilia I. Barakova, Matthias Raute...
NAR
2011
216views Computer Vision» more  NAR 2011»
12 years 10 months ago
ChemProt: a disease chemical biology database
Systems pharmacology is an emergent area that studies drug action across multiple scales of complexity, from molecular and cellular to tissue and organism levels. There is a criti...
Olivier Taboureau, Sonny Kim Nielsen, Karine Audou...
GIS
2008
ACM
14 years 9 months ago
Fast and extensible building modeling from airborne LiDAR data
This paper presents an automatic algorithm which reconstructs building models from airborne LiDAR (light detection and ranging) data of urban areas. While our algorithm inherits t...
Qian-Yi Zhou, Ulrich Neumann