Sciweavers

16070 search results - page 195 / 3214
» Identifying
Sort
View
143
Voted
BVAI
2005
Springer
15 years 10 months ago
Learning Location Invariance for Object Recognition and Localization
A visual system not only needs to recognize a stimulus, it also needs to find the location of the stimulus. In this paper, we present a neural network model that is able to genera...
Gwendid T. van der Voort van der Kleij, Frank van ...
ITCC
2002
IEEE
15 years 9 months ago
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes
Audio watermarking has become an important technology for recording and advertisement industry. Today’s embedding and detection strategies often rely on digital or at least high...
Martin Steinebach, Andreas Lang, Jana Dittmann, Ch...
ITS
2010
Springer
167views Multimedia» more  ITS 2010»
15 years 9 months ago
Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models
Identifying effective tutorial dialogue strategies is a key issue for intelligent tutoring systems research. Human-human tutoring offers a valuable model for identifying effective ...
Kristy Elizabeth Boyer, Robert Phillips, Amy Ingra...
121
Voted
PROFES
2001
Springer
15 years 9 months ago
Improving Knowledge Management in Software Reuse Process
We demonstrate the need for reuse in today's software development organisations in the light of widely accepted literature. Based on this need, we introduce the reuse processe...
Timo Kucza, Minna Nättinen, Päivi Parvia...
114
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur