Sciweavers

1407 search results - page 83 / 282
» Cognition without content
Sort
View
TSD
2009
Springer
15 years 7 months ago
On a Computational Model for Language Acquisition: Modeling Cross-Speaker Generalisation
Abstract. The discovery of words by young infants involves two interrelated processes: (a) the detection of recurrent word-like acoustic patterns in the speech signal, and (b) cros...
Louis ten Bosch, Joris Driesen, Hugo Van Hamme, Lo...
ICASSP
2008
IEEE
15 years 7 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu
98
Voted
CISS
2007
IEEE
15 years 7 months ago
An EM Technique for Multiple Transmitter Localization
— We propose an expectation-maximization (EM) technique for locating multiple transmitters based on power levels observed by a set of arbitrarily-placed receivers. Multiple trans...
Jill K. Nelson, Maya R. Gupta
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
15 years 6 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
DALT
2005
Springer
15 years 6 months ago
Modelling Uncertainty in Agent Programming
Existing cognitive agent programming languages that are based on the BDI model employ logical representation and reasoning for implementing the beliefs of agents. In these programm...
Johan Kwisthout, Mehdi Dastani