Sciweavers

220 search results - page 34 / 44
» Trusted business system model using context sensitiveness
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Robust discriminative keyword spotting for emotionally colored spontaneous speech using bidirectional LSTM networks
In this paper we propose a new technique for robust keyword spotting that uses bidirectional Long Short-Term Memory (BLSTM) recurrent neural nets to incorporate contextual informa...
Martin Wöllmer, Florian Eyben, Joseph Keshet,...
ATAL
2005
Springer
14 years 1 months ago
Agent-based integration of Web Services with Workflow Management Systems
Rapid changes in the business environment call for more flexible and adaptive workflow systems. Researchers have proposed that Workflow Management Systems (WfMSs) comprising multi...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...
WECWIS
2007
IEEE
119views ECommerce» more  WECWIS 2007»
14 years 1 months ago
Towards an Objective Assessment of Centrality Measures in Reputation Systems
Reputation systems facilitate cooperation in open environments. Centrality-based reputation systems use centrality measures to rank individuals, i.e., compute their reputation bas...
Christian von der Weth, Klemens Böhm
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
PAMI
2012
11 years 10 months ago
Nonlinear Shape Registration without Correspondences
—In this paper, we propose a novel framework to estimate the parameters of a diffeomorphism that aligns a known shape and its distorted observation. Classical registration method...
Csaba Domokos, Jozsef Nemeth, Zoltan Kato