Abstract. The implementation of a pseudo text-independent Speaker Verification system is described. This system was designed to use only information extracted directly from the cod...
Antonio Moreno-Daniel, Biing-Hwang Juang, Juan Art...
We present a data-driven algorithm for interactive 3D human character posing. We formulate the problem in a maximum a posteriori (MAP) framework by combining the user’s inputs w...
We present a visualization system for reviewing the turn-taking patterns in a face-to-face meeting. Without the need to directly observe a group, a user can use the system to gain...
Joan Morris DiMicco, Katherine J. Hollenbach, Walt...
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
Direct manipulation interfaces are characterised according to the representation of the task domain: the domain objects and the effect of user operations on those objects. In the ...