Sciweavers

3088 search results - page 598 / 618
» Online Passive-Aggressive Algorithms
Sort
View
168
Voted
MIDDLEWARE
2009
Springer
15 years 9 months ago
Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications
Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configura...
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Kriv...
RAID
2009
Springer
15 years 9 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
MOBILITY
2009
ACM
15 years 9 months ago
Feasibility evaluation of a communication-oriented P2P system in mobile environments
We present the feasibility evaluation of a structured communication-oriented Peer-to-Peer (P2P) system being used in mobile environments in this paper. The different levels of chu...
Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Y...
143
Voted
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
15 years 9 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...
126
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Adaptation of compressed HMM parameters for resource-constrained speech recognition
Recently, we successfully developed and reported a new unsupervised online adaptation technique, which jointly compensates for additive and convolutive distortions with vector Tay...
Jinyu Li, Li Deng, Dong Yu, Jian Wu, Yifan Gong, A...