Sciweavers

315 search results - page 51 / 63
» Model recommendation for action recognition
Sort
View
IFIP
2009
Springer
15 years 4 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
CSFW
2011
IEEE
13 years 9 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
72
Voted
LREC
2010
155views Education» more  LREC 2010»
14 years 11 months ago
WTIMIT: The TIMIT Speech Corpus Transmitted Over The 3G AMR Wideband Mobile Network
Due to upcoming mobile telephony services with higher speech quality, a wideband (50 Hz to 7 kHz) mobile telephony derivative of TIMIT has been recorded called WTIMIT. It allows a...
Patrick Bauer, David Scheler, Tim Fingscheidt
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 2 days ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...
72
Voted
CHI
2010
ACM
15 years 4 months ago
A stage-based model of personal informatics systems
People strive to obtain self-knowledge. A class of systems called personal informatics is appearing that help people collect and reflect on personal information. However, there is...
Ian Li, Anind K. Dey, Jodi Forlizzi