Sciweavers

2702 search results - page 392 / 541
» Requirements Processes: An Experience Report
Sort
View
WISTP
2010
Springer
14 years 5 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
PERVASIVE
2010
Springer
14 years 5 months ago
Common Sense Community: Scaffolding Mobile Sensing and Analysis for Novice Users
As sensing technologies become increasingly distributed and democratized, citizens and novice users are becoming responsible for the kinds of data collection and analysis that have...
Wesley Willett, Paul M. Aoki, Neil Kumar, Sushmita...
TEI
2009
ACM
151views Hardware» more  TEI 2009»
14 years 5 months ago
Architales: physical/digital co-design of an interactive story table
Many research efforts today explore how digitally augmented tables enable face-to-face interaction with digital content and applications. Yet the design of digital tables is still...
Ali Mazalek, Claudia Winegarden, Tristan Al-Haddad...
ICASSP
2009
IEEE
14 years 5 months ago
A joint decoding algorithm for multiple-example-based addition of words to a pronunciation lexicon
We propose an algorithm that enables joint Viterbi decoding of multiple independent audio recordings of a word to derive its pronunciation. Experiments show that this method resul...
Dhananjay Bansal, Nishanth Nair, Rita Singh, Bhiks...
ICASSP
2009
IEEE
14 years 5 months ago
Leveraging multiple query logs to improve language models for spoken query recognition
A voice search system requires a speech interface that can correctly recognize spoken queries uttered by users. The recognition performance strongly relies on a robust language mo...
Xiao Li, Patrick Nguyen, Geoffrey Zweig, Dan Bohus