Sciweavers

3812 search results - page 636 / 763
» Combinations of TRAP Based Systems
Sort
View
MLMI
2005
Springer
15 years 3 months ago
Automatic Speech Recognition and Speech Activity Detection in the CHIL Smart Room
Abstract. An important step to bring speech technologies into wide deployment as a functional component in man-machine interfaces is to free the users from close-talk or desktop mi...
Stephen M. Chu, Etienne Marcheret, Gerasimos Potam...
OTM
2005
Springer
15 years 3 months ago
Don't Mind Your Vocabulary: Data Sharing Across Heterogeneous Peers
The strong dynamics of peer-to-peer networks, coupled with the diversity of peer vocabularies, makes query processing in peer database systems a very challenging task. In this pape...
Mehedi Masud, Iluju Kiringa, Anastasios Kementsiet...
PCM
2005
Springer
106views Multimedia» more  PCM 2005»
15 years 3 months ago
Automated Detection of Tumors in Mammograms Using Two Segments for Classification
A spread pattern of a tumor in medical images is an important factor for classification of the tumor. The spread pattern is generally not considered when we use only one segment fo...
Mahmoud R. Hejazi, Yo-Sung Ho
PCM
2005
Springer
170views Multimedia» more  PCM 2005»
15 years 3 months ago
Realtime Control for Motion Creation of 3D Avatars
In this paper, we are proposing a new mechanism for controlling 3D (three dimensional) avatars to create user-designed peculiar motions of avatars in real-time using general interf...
Dong Kim, Mee Young Sung, Jong Seung Park, Kyungko...
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman