Sciweavers

8655 search results - page 1405 / 1731
» Challenges for Trusted Computing
Sort
View
108
Voted
MT
2002
107views more  MT 2002»
15 years 3 months ago
Translation with Scarce Bilingual Resources
Machine translation of human languages is a field almost as old as computers themselves. Recent approaches to this challenging problem aim at learning translation knowledge automat...
Yaser Al-Onaizan, Ulrich Germann, Ulf Hermjakob, K...
137
Voted
NECO
2002
145views more  NECO 2002»
15 years 3 months ago
Bayesian Model Assessment and Comparison Using Cross-Validation Predictive Densities
In this work, we discuss practical methods for the assessment, comparison, and selection of complex hierarchical Bayesian models. A natural way to assess the goodness of the model...
Aki Vehtari, Jouko Lampinen
PAMI
2002
136views more  PAMI 2002»
15 years 3 months ago
On the Individuality of Fingerprints
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
Sharath Pankanti, Salil Prabhakar, Anil K. Jain
166
Voted
PAMI
2002
195views more  PAMI 2002»
15 years 3 months ago
Detecting Faces in Images: A Survey
Images containing faces are essential to intelligent vision-based human computer interaction, and research efforts in face processing include face recognition, face tracking, pose ...
Ming-Hsuan Yang, David J. Kriegman, Narendra Ahuja
136
Voted
SIGMETRICS
1998
ACM
15 years 3 months ago
Internet service performance failure detection
The increasing complexity of computer networks and our increasing dependence on them means enforcing reliability requirements is both more challenging and more critical. The expan...
Amy R. Ward, Peter W. Glynn, Kathy J. Richardson
« Prev « First page 1405 / 1731 Last » Next »