Sciweavers

1534 search results - page 179 / 307
» Error Reporting Logic
Sort
View
HVEI
2009
15 years 1 months ago
Internet experiments: methods, guidelines, metadata
The Internet experiment is now a well-established and widely used method. The present paper describes guidelines for the proper conduct of Internet experiments, e.g. handling of d...
Ulf-Dietrich Reips
ICDAR
2009
IEEE
15 years 1 months ago
German Lute Tablature Recognition
This paper describes a document recognition system for 16th century German staffless lute tablature notation. We present methods for page layout analysis, symbol recognition and s...
Christoph Dalitz, Christine Pranzas
INTERSPEECH
2010
14 years 11 months ago
A comparative study of constrained and unconstrained approaches for segmentation of speech signal
In this work, we compare different approaches for speech segmentation, of which some are constrained and the remaining are unconstrained by phone transcript. A high accuracy speec...
Venkatesh Keri, Kishore Prahallad
COLING
2010
14 years 10 months ago
Maximum Metric Score Training for Coreference Resolution
A large body of prior research on coreference resolution recasts the problem as a two-class classification problem. However, standard supervised machine learning algorithms that m...
Shanheng Zhao, Hwee Tou Ng
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko