Sciweavers

642 search results - page 72 / 129
» Text Classification Using Stochastic Keyword Generation
Sort
View
ACMSE
2009
ACM
13 years 7 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
ATAL
2009
Springer
14 years 3 months ago
Learning a model of speaker head nods using gesture corpora
During face-to-face conversation, the speaker’s head is continually in motion. These movements serve a variety of important communicative functions. Our goal is to develop a mod...
Jina Lee, Stacy Marsella
AND
2010
13 years 7 months ago
Document: a useful level for facing noisy data
In this paper we will present a set of experiments using large digitalized collections of books to show that logical structures can be extracted with good quality when working at ...
Hervé Déjean, Jean-Luc Meunier
CHI
2008
ACM
14 years 9 months ago
Threshold devices: looking out from the home
Threshold devices present information gathered from the home's surroundings to give new views on the domestic situation. We built two prototypes of different threshold device...
William W. Gaver, Andy Boucher, Andy Law, Sarah Pe...
SIGGRAPH
1994
ACM
14 years 1 months ago
The RADIANCE lighting simulation and rendering system
This paper describes a physically-based rendering system tailored to the demands of lighting design and architecture. The simulation uses a light-backwards ray-tracing method with...
Gregory J. Ward