Sciweavers

6434 search results - page 974 / 1287
» Model Transformations with Reference Models
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CLEAR
2007
Springer
144views Biometrics» more  CLEAR 2007»
15 years 10 months ago
The SRI-ICSI Spring 2007 Meeting and Lecture Recognition System
We describe the latest version of the SRI-ICSI meeting and lecture recognition system, as was used in the NIST RT-07 evaluations, highlighting improvements made over the last year....
Andreas Stolcke, Xavier Anguera, Kofi Boakye, &Oum...
GECCO
2007
Springer
210views Optimization» more  GECCO 2007»
15 years 10 months ago
An application of EDA and GA to dynamic pricing
E-commerce has transformed the way firms develop their pricing strategies, producing shift away from fixed pricing to dynamic pricing. In this paper, we use two different Estim...
Siddhartha Shakya, Fernando Oliveira, Gilbert Owus...
HUMO
2007
Springer
15 years 10 months ago
Multi-activity Tracking in LLE Body Pose Space
We present a method to simultaneously estimate 3d body pose and action categories from monocular video sequences. Our approach learns a lowdimensional embedding of the pose manifol...
Tobias Jaeggli, Esther Koller-Meier, Luc J. Van Go...
NOLISP
2007
Springer
15 years 10 months ago
Phase-Based Methods for Voice Source Analysis
Voice source analysis is an important but difficult issue for speech processing. In this talk, three aspects of voice source analysis recently developed at LIMSI (Orsay, France) a...
Christophe d'Alessandro, Baris Bozkurt, Boris Dova...