Sciweavers

881 search results - page 175 / 177
» Extracting Appraisal Expressions
Sort
View
TCS
2002
13 years 5 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
TVCG
2002
135views more  TVCG 2002»
13 years 5 months ago
Three-Dimensional Interfaces for Querying by Example in Content-Based Image Retrieval
Image databases are nowadays widely exploited in a number of different contexts, ranging from history of art, through medicine, to education. Existing querying paradigms are based ...
Jürgen Assfalg, Alberto Del Bimbo, Pietro Pal...
PAAPP
2007
109views more  PAAPP 2007»
13 years 5 months ago
Relation rule mining
\Web users are nowadays confronted with the huge variety of available information sources whose content is not targeted at any specific group or layer. Recommendation systems aim...
Mehdi Adda, Rokia Missaoui, Petko Valtchev
PAMI
2007
144views more  PAMI 2007»
13 years 5 months ago
Facial Action Unit Recognition by Exploiting Their Dynamic and Semantic Relationships
—A system that could automatically analyze the facial actions in real time has applications in a wide range of different fields. However, developing such a system is always chall...
Yan Tong, Wenhui Liao, Qiang Ji
LPAR
2010
Springer
13 years 4 months ago
The Consistency of the CADIAG-2 Knowledge Base: A Probabilistic Approach
Abstract. The paper presents the methodology and the results of checking consistency of the knowledge base of CADIAG-2, a large-scale medical expert system. Such knowledge base con...
Pavel Klinov, Bijan Parsia, David Picado-Mui&ntild...