Sciweavers

168 search results - page 29 / 34
» Matching as a non-cooperative game
Sort
View
SP
2009
IEEE
15 years 4 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
COCO
2009
Springer
128views Algorithms» more  COCO 2009»
15 years 4 months ago
Inapproximability of Vertex Cover and Independent Set in Bounded Degree Graphs
We study the inapproximability of Vertex Cover and Independent Set on degree d graphs. We prove that: • Vertex Cover is Unique Games-hard to approximate to within a factor 2−(...
Per Austrin, Subhash Khot, Muli Safra
ICVS
2009
Springer
15 years 4 months ago
Who's Counting? Real-Time Blackjack Monitoring for Card Counting Detection
This paper describes a computer vision system to detect card counters and dealer errors in a game of Blackjack from an overhead stereo camera. Card counting is becoming increasingl...
Krists Zutis, Jesse Hoey
ICMCS
2007
IEEE
107views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Generation of Speaker Mixture Voice using Spectrum Morphing
We propose a method for synthesizing a “speaker mixture voice” that has both of two speakers’ individualities. We define the “speaker mixture voice” as such that 50 per...
Kohei Furuya, Tsuyoshi Moriyama, Shinji Ozawa
NLDB
2007
Springer
15 years 3 months ago
Automatic Issue Extraction from a Focused Dialogue
Various methodologies for structuring the process of domain modeling have been proposed, but there are few software tools that provide automatic support for the process of construc...
Koen V. Hindriks, Stijn Hoppenbrouwers, Catholijn ...