Sciweavers

29 search results - page 5 / 6
» Intention modelling: approximating computer user intentions ...
Sort
View
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
13 years 10 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
RTCSA
2003
IEEE
13 years 10 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
CVPR
2000
IEEE
14 years 7 months ago
Multimodal Speaker Detection Using Error Feedback Dynamic Bayesian Networks
Design and development of novel human-computer interfaces poses a challenging problem: actions and intentions of users have to be inferred from sequences of noisy and ambiguous mu...
Vladimir Pavlovic, James M. Rehg, Ashutosh Garg, T...
ACL
2011
12 years 8 months ago
Fine-Grained Class Label Markup of Search Queries
We develop a novel approach to the semantic analysis of short text segments and demonstrate its utility on a large corpus of Web search queries. Extracting meaning from short text...
Joseph Reisinger, Marius Pasca
LION
2007
Springer
113views Optimization» more  LION 2007»
13 years 11 months ago
Limited-Memory Techniques for Sensor Placement in Water Distribution Networks
Abstract. The practical utility of optimization technologies is often impacted by factors that reflect how these tools are used in practice, including whether various real-world c...
William E. Hart, Jonathan W. Berry, Erik G. Boman,...