Sciweavers

1308 search results - page 188 / 262
» Let's Have a Conversation
Sort
View
COLING
1996
15 years 15 days ago
The Power of Words in Message Planning
Abstract: Before engaging in a conversation, a message must be planned. While there are many ways to perform this task, I believe that people do this in the following way, in parti...
Michael Zock
CCS
2010
ACM
14 years 11 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
ICASSP
2010
IEEE
14 years 11 months ago
Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity
We extensively evaluated a data hiding algorithm for stereo audio signals which embeds data using the polarity of the echoes added to the high-frequency channels, which we have pr...
Kazuhiro Kondo
BIOSYSTEMS
2007
87views more  BIOSYSTEMS 2007»
14 years 11 months ago
Robot control with biological cells
At present there exists a large gap in size, performance, adaptability and robustness between natural and artificial information processors for performing coherent perception-act...
Soichiro Tsuda, Klaus-Peter Zauner, Yukio-Pegio Gu...
COGSCI
2010
93views more  COGSCI 2010»
14 years 11 months ago
The Evolution of Relevance
With human language, the same utterance can have different meanings in different contexts. Nevertheless, listeners almost invariably converge upon the correct intended meaning. Th...
Thomas C. Scott-Phillips