Sciweavers

3926 search results - page 755 / 786
» Deriving Information Requirements from Responsibility Models
Sort
View
171
Voted
ISW
2010
Springer
14 years 11 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
134
Voted
INTERSPEECH
2010
14 years 8 months ago
Vocabulary independent spoken query: a case for subword units
In this work, we describe a subword unit approach for information retrieval of items by voice. An algorithm based on the minimum description length (MDL) principle converts an ind...
Evandro B. Gouvêa, Tony Ezzat
WWW
2009
ACM
16 years 2 months ago
Seller's credibility in electronic markets: a complex network based approach
In the last decade, there has been an explosion of online commercial activity enabled by the World Wide Web. An electronic marketplace (e-market) provides an online method to perf...
Adriano M. Pereira, Arlei Silva, Wagner Meira Jr.,...
ICMI
2005
Springer
267views Biometrics» more  ICMI 2005»
15 years 7 months ago
XfaceEd: authoring tool for embodied conversational agents
In this paper, XfaceEd, our open source, platform independent tool for authoring 3D embodied conversational agents (ECAs) is presented. Following MPEG-4 Facial Animation (FA) stan...
Koray Balci
107
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes