Sciweavers

14 search results - page 3 / 3
» Switching between Hidden Markov Models using Fixed Share
Sort
View
PERCOM
2006
ACM
14 years 5 months ago
A Keystroke and Pointer Control Input Interface for Wearable Computers
The widespread adoption of mobile electronic devices and the advent of wearable computing has encouraged the development of compact alternatives to the keyboard and mouse. These i...
Farooq Ahmad, Petr Musílek
NAACL
2003
13 years 7 months ago
Implicit Trajectory Modeling through Gaussian Transition Models for Speech Recognition
It is well known that frame independence assumption is a fundamental limitation of current HMM based speech recognition systems. By treating each speech frame independently, HMMs ...
Hua Yu, Tanja Schultz
TMC
2008
90views more  TMC 2008»
13 years 5 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 6 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal