Sciweavers

5722 search results - page 1138 / 1145
» Security Function Interactions
Sort
View
JAIR
2010
142views more  JAIR 2010»
13 years 7 months ago
Context-based Word Acquisition for Situated Dialogue in a Virtual World
To tackle the vocabulary problem in conversational systems, previous work has applied unsupervised learning approaches on co-occurring speech and eye gaze during interaction to au...
Shaolin Qu, Joyce Yue Chai
JCST
2010
119views more  JCST 2010»
13 years 7 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JFP
2010
107views more  JFP 2010»
13 years 7 months ago
Lightweight checkpointing for concurrent ML
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Suresh Jagannathan
JOCN
2010
85views more  JOCN 2010»
13 years 7 months ago
The Neural Bases of Distraction and Reappraisal
■ Distraction and reappraisal are two commonly used forms of cognitive emotion regulation. Functional neuroimaging studies have shown that each one depends upon interactions bet...
Kateri McRae, Brent Hughes, Sita Chopra, John D. E...
JSAC
2010
138views more  JSAC 2010»
13 years 7 months ago
Dynamic conjectures in random access networks using bio-inspired learning
—Inspired by the biological entities’ ability to achieve reciprocity in the course of evolution, this paper considers a conjecture-based distributed learning approach that enab...
Yi Su, Mihaela van der Schaar
« Prev « First page 1138 / 1145 Last » Next »