Sciweavers

15 search results - page 2 / 3
» Parameterization Studies for the SAM and HMMER Methods of Hi...
Sort
View
CHI
1999
ACM
13 years 9 months ago
Inferring Intent in Eye-Based Interfaces: Tracing Eye Movements with Process Models
While current eye-based interfaces offer enormous potential for efficient human-computer interaction, they also manifest the difficulty of inferring intent from user eye movements...
Dario D. Salvucci
CSL
2010
Springer
13 years 5 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
13 years 9 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
13 years 10 months ago
Studying the Advantages of a Messy Evolutionary Algorithm for Natural Language Tagging
The process of labeling each word in a sentence with one of its lexical categories (noun, verb, etc) is called tagging and is a key step in parsing and many other language processi...
Lourdes Araujo
EDM
2008
169views Data Mining» more  EDM 2008»
13 years 6 months ago
Mining Student Behavior Models in Learning-by-Teaching Environments
This paper discusses our approach to building models and analyzing student behaviors in different versions of our learning by teaching environment where students learn by teaching ...
Hogyeong Jeong, Gautam Biswas