Sciweavers

3954 search results - page 675 / 791
» Image-based Model Completion
Sort
View
150
Voted
SIGDIAL
2010
15 years 11 days ago
Adaptive Referring Expression Generation in Spoken Dialogue Systems: Evaluation with Real Users
We present new results from a real-user evaluation of a data-driven approach to learning user-adaptive referring expression generation (REG) policies for spoken dialogue systems. ...
Srinivasan Janarthanam, Oliver Lemon
SIGSOFT
2010
ACM
15 years 11 days ago
Staged concurrent program analysis
Concurrent program verification is challenging because it involves exploring a large number of possible thread interleavings together with complex sequential reasoning. As a resul...
Nishant Sinha, Chao Wang
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 9 days ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
131
Voted
HCI
2009
15 years 8 days ago
Adaptive Learning via Social Cognitive Theory and Digital Cultural Ecosystems
This paper will look at the human predisposition to oral tradition and its effectiveness as a learning tool to convey mission-critical information. After exploring the effectivenes...
Joseph Juhnke, Adam R. Kallish
121
Voted
ICDAR
2009
IEEE
15 years 7 days ago
Offline Signature Verification Based on Pseudo-Cepstral Coefficients
Features representing information about pressure distribution from a static image of a handwritten signature are analyzed for an offline verification system. From gray-scale image...
Jesus Francisco Vargas Bonilla, Miguel Angel Ferre...