Sciweavers

15351 search results - page 2761 / 3071
» The information bottleneck method
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
ICASSP
2011
IEEE
14 years 7 months ago
Multi-view and multi-objective semi-supervised learning for large vocabulary continuous speech recognition
Current hidden Markov acoustic modeling for large vocabulary continuous speech recognition (LVCSR) relies on the availability of abundant labeled transcriptions. Given that speech...
Xiaodong Cui, Jing Huang, Jen-Tzung Chien
ACL
2011
14 years 7 months ago
Interactive Topic Modeling
Topic models have been used extensively as a tool for corpus exploration, and a cottage industry has developed to tweak topic models to better encode human intuitions or to better...
Yuening Hu, Jordan L. Boyd-Graber, Brianna Satinof...
CHI
2011
ACM
14 years 7 months ago
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
HAIS
2011
Springer
14 years 7 months ago
Clustering Ensemble for Spam Filtering
One of the main problems that modern e-mail systems face is the management of the high degree of spam or junk mail they recieve. Those systems are expected to be able to distinguis...
Santiago Porras, Bruno Baruque, Belén Vaque...
« Prev « First page 2761 / 3071 Last » Next »