Sciweavers

1056 search results - page 28 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
MMM
2012
Springer
324views Multimedia» more  MMM 2012»
12 years 3 months ago
Sensor-Based Analysis of User Generated Video for Multi-camera Video Remixing
In this work we propose to exploit context sensor data for analyzing user generated videos. Firstly, we perform a low-level indexing of the recorded media with the instantaneous co...
Francesco Cricri, Igor D. D. Curcio, Sujeet Mate, ...
ICDAR
2009
IEEE
13 years 5 months ago
A Method for Automatically Extracting Road Layers from Raster Maps
To exploit the road network in raster maps, the first step is to extract the pixels that constitute the roads and then vectorize the road pixels. Identifying colors that represent...
Yao-Yi Chiang, Craig A. Knoblock
AAAI
2011
12 years 7 months ago
Preferred Explanations: Theory and Generation via Planning
In this paper we examine the general problem of generating preferred explanations for observed behavior with respect to a model of the behavior of a dynamical system. This problem...
Shirin Sohrabi, Jorge A. Baier, Sheila A. McIlrait...
HCI
2011
12 years 11 months ago
Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues
We studied communication patterns in face-to-face dialogues between people for the purpose of identifying conversation features that can be exploited to improve human-computer inte...
Masashi Inoue, Toshio Irino, Nobuhiro Furuyama, Ry...
USS
2010
13 years 5 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp