Sciweavers

1486 search results - page 221 / 298
» Firewall Rules Analysis
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
Improved pos tagging for text-to-speech synthesis
One of the fundamental building blocks of text processing for textto-speech (TTS) synthesis is the assignment of a part-of-speech (POS) tag to each input word. POS tags are heavil...
Ming Sun, Jerome R. Bellegarda
ICDAR
2011
IEEE
13 years 11 months ago
Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting
—We propose a new method for an effective removal of the printing artifacts occurring in historical newspapers which are caused by problems in the hot metal typesetting, a widely...
Iuliu Vasile Konya, Stefan Eickeler, Christoph Sei...
KDD
2002
ACM
175views Data Mining» more  KDD 2002»
16 years 8 days ago
Mining product reputations on the Web
Knowing the reputations of your own and/or competitors' products is important for marketing and customer relationship management. It is, however, very costly to collect and a...
Satoshi Morinaga, Kenji Yamanishi, Kenji Tateishi,...
PERCOM
2006
ACM
15 years 11 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
CIVR
2008
Springer
182views Image Analysis» more  CIVR 2008»
15 years 1 months ago
Fusion of audio and visual cues for laughter detection
Past research on automatic laughter detection has focused mainly on audio-based detection. Here we present an audiovisual approach to distinguishing laughter from speech and we sh...
Stavros Petridis, Maja Pantic