Sciweavers

1518 search results - page 247 / 304
» Cryptographic Test Correction
Sort
View
AI
2011
Springer
14 years 4 months ago
Comparing Humans and Automatic Speech Recognition Systems in Recognizing Dysarthric Speech
Abstract. Speech is a complex process that requires control and coordination of articulation, breathing, voicing, and prosody. Dysarthria is a manifestation of an inability to cont...
Kinfe Tadesse Mengistu, Frank Rudzicz
CHI
2011
ACM
14 years 4 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
101
Voted
CIDR
2011
230views Algorithms» more  CIDR 2011»
14 years 4 months ago
Consistency Analysis in Bloom: a CALM and Collected Approach
Distributed programming has become a topic of widespread interest, and many programmers now wrestle with tradeoffs between data consistency, availability and latency. Distributed...
Peter Alvaro, Neil Conway, Joe Hellerstein, Willia...
FLAIRS
2011
14 years 4 months ago
Given Bilingual Terminology in Statistical Machine Translation: MWE-Sensitve Word Alignment and Hierarchical Pitman-Yor Process-
This paper considers a scenario when we are given almost perfect knowledge about bilingual terminology in terms of a test corpus in Statistical Machine Translation (SMT). When the...
Tsuyoshi Okita, Andy Way
147
Voted
HAIS
2011
Springer
14 years 4 months ago
Clustering Ensemble for Spam Filtering
One of the main problems that modern e-mail systems face is the management of the high degree of spam or junk mail they recieve. Those systems are expected to be able to distinguis...
Santiago Porras, Bruno Baruque, Belén Vaque...