Sciweavers

194 search results - page 21 / 39
» TBox Classification in Parallel: Design and First Evaluation
Sort
View
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
ICPPW
2006
IEEE
14 years 1 months ago
Embedded Knowledge-Based Speech Detectors for Real-Time Recognition Tasks
Speech recognition has become common in many application domains, from dictation systems for professional practices to vocal user interfaces for people with disabilities or hands-...
Sabato Marco Siniscalchi, Fulvio Gennaro, Salvator...
CHI
2010
ACM
14 years 2 months ago
Presenting diverse political opinions: how and how much
Is a polarized society inevitable, where people choose to be exposed to only political news and commentary that reinforces their existing viewpoints? We examine the relationship b...
Sean A. Munson, Paul Resnick
CHI
2010
ACM
14 years 2 months ago
iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces
When asked to draw, many people are hesitant because they consider themselves unable to draw well. This paper describes the first system for a computer to provide direction and fe...
Daniel Dixon, Manoj Prasad, Tracy Hammond
GECCO
2007
Springer
194views Optimization» more  GECCO 2007»
14 years 1 months ago
Hybrid coevolutionary algorithms vs. SVM algorithms
As a learning method support vector machine is regarded as one of the best classifiers with a strong mathematical foundation. On the other hand, evolutionary computational techniq...
Rui Li, Bir Bhanu, Krzysztof Krawiec