Sciweavers

329 search results - page 21 / 66
» An algorithm for recognition of n-collapsing words
Sort
View
COCOON
2006
Springer
15 years 4 months ago
Characterizations and Linear Time Recognition of Helly Circular-Arc Graphs
Abstract. A circular-arc model (C, A) is a circle C together with a collection A of arcs of C. If A satisfies the Helly Property then (C, A) is a Helly circular-arc model. A (Helly...
Min Chih Lin, Jayme Luiz Szwarcfiter
MLMI
2007
Springer
15 years 6 months ago
Using Prosodic Features in Language Models for Meetings
Abstract. Prosody has been actively studied as an important knowledge source for speech recognition and understanding. In this paper, we are concerned with the question of exploiti...
Songfang Huang, Steve Renals
TALG
2008
67views more  TALG 2008»
15 years 5 days ago
Structure and linear-time recognition of 4-leaf powers
A graph G is the k-leaf power of a tree T if its vertices are leaves of T such that two vertices are adjacent in G if and only if their distance in T is at most k. Then T is a k-le...
Andreas Brandstädt, Van Bang Le, R. Sritharan
DAS
2004
Springer
15 years 5 months ago
Automatic Fax Routing
Abstract. We present a system for automatic FAX routing which processes incoming FAX images and forwards them to the correct email alias. The system first performs optical charact...
Paul A. Viola, James Rinker, Martin Law
PR
2010
141views more  PR 2010»
14 years 7 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...