Sciweavers

3976 search results - page 656 / 796
» Machine Learning in User Modeling
Sort
View
CCS
2008
ACM
15 years 7 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
169
Voted
DIM
2005
ACM
15 years 7 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
ICTAI
2007
IEEE
15 years 11 months ago
CompoNet: Programmatically Embedding Neural Networks into AI Applications as Software Components
The provision of embedding neural networks into software applications can enable variety of Artificial Intelligence systems for individual users as well as organizations. Previous...
Uzair Ahmad, Andrey Gavrilov, Sungyoung Lee, Young...
SIGCSE
2008
ACM
120views Education» more  SIGCSE 2008»
15 years 5 months ago
A system for developing tablet pc applications for education
We describe a new system for building Tablet PC-based classroom software. The system, called SLICE, is built for extensibility, using a unique "explicit state" model. Ap...
Sam Kamin, Michael Hines, Chad Peiper, Boris Capit...
CVPR
2009
IEEE
17 years 4 days ago
Localized Content-Based Image Retrieval Through Evidence Region Identification
Over the past decade, multiple-instance learning (MIL) has been successfully utilized to model the localized content-based image retrieval (CBIR) problem, in which a bag corresp...
Wu-Jun Li (Hong Kong University of Science and Tec...