Sciweavers

2363 search results - page 454 / 473
» Learning Algorithms for Domain Adaptation
Sort
View
CCS
2003
ACM
14 years 23 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
TASLP
2002
143views more  TASLP 2002»
13 years 7 months ago
Creating conversational interfaces for children
Creating conversational interfaces for children is challenging in several respects. These include acoustic modeling for automatic speech recognition (ASR), language and dialog mode...
Shrikanth S. Narayanan, Alexandros Potamianos
HOTNETS
2010
13 years 2 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...
ATAL
2007
Springer
14 years 1 months ago
Conditional random fields for activity recognition
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
MM
2005
ACM
250views Multimedia» more  MM 2005»
14 years 1 months ago
An object-based video coding framework for video sequences obtained from static cameras
This paper presents a novel object-based video coding framework for videos obtained from a static camera. As opposed to most existing methods, the proposed method does not require...
Asaad Hakeem, Khurram Shafique, Mubarak Shah