Sciweavers

5684 search results - page 329 / 1137
» Computing with active dendrites
Sort
View
287
Voted
CSL
2011
Springer
14 years 12 months ago
Detecting emotional state of a child in a conversational computer game
The automatic recognition of user’s communicative style within a spoken dialog system framework, including the affective aspects, has received increased attention in the past f...
Serdar Yildirim, Shrikanth Narayanan, Alexandros P...
BMCBI
2011
14 years 8 months ago
Acorn: A grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks v
Background: Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the gen...
Jacek Sroka, Lukasz Bieniasz-Krzywiec, Szymon Gwoz...
TOG
2012
582views Communications» more  TOG 2012»
13 years 7 months ago
Synthesis of detailed hand manipulations using contact sampling
Capturing human activities that involve both gross full-body motion and detailed hand manipulation of objects is challenging for standard motion capture systems. We introduce a ne...
Yuting Ye, C. Karen Liu
PET
2004
Springer
15 years 10 months ago
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
Abstract. In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. Data will often be streaming at high rates (video and au...
Yitao Duan, John F. Canny
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
15 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny