Sciweavers

4272 search results - page 715 / 855
» A Case for Automatic System Evaluation
Sort
View
ISI
2006
Springer
14 years 10 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
SIGIR
2008
ACM
14 years 10 months ago
Learning to rank with partially-labeled data
Ranking algorithms, whose goal is to appropriately order a set of objects/documents, are an important component of information retrieval systems. Previous work on ranking algorith...
Kevin Duh, Katrin Kirchhoff
TSMC
2008
167views more  TSMC 2008»
14 years 9 months ago
A Human-Computer Interface Using Symmetry Between Eyes to Detect Gaze Direction
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the per...
John J. Magee, Margrit Betke, James Gips, M. R. Sc...
JAIR
2010
111views more  JAIR 2010»
14 years 8 months ago
Training a Multilingual Sportscaster: Using Perceptual Context to Learn Language
We present a novel framework for learning to interpret and generate language using only perceptual context as supervision. We demonstrate its capabilities by developing a system t...
David L. Chen, Joohyun Kim, Raymond J. Mooney
SPIN
2010
Springer
14 years 8 months ago
Context-Enhanced Directed Model Checking
Directed model checking is a well-established technique to efficiently tackle the state explosion problem when the aim is to find error states in concurrent systems. Although dir...
Martin Wehrle, Sebastian Kupferschmid