Sciweavers

180 search results - page 24 / 36
» TTCN-3 Quality Engineering: Using Learning Techniques to Eva...
Sort
View
WWW
2003
ACM
15 years 10 months ago
Mining the peanut gallery: opinion extraction and semantic classification of product reviews
The web contains a wealth of product reviews, but sifting through them is a daunting task. Ideally, an opinion mining tool would process a set of search results for a given item, ...
Kushal Dave, Steve Lawrence, David M. Pennock
COLING
2010
14 years 5 months ago
Cross-Market Model Adaptation with Pairwise Preference Data for Web Search Ranking
Machine-learned ranking techniques automatically learn a complex document ranking function given training data. These techniques have demonstrated the effectiveness and flexibilit...
Jing Bai, Fernando Diaz, Yi Chang, Zhaohui Zheng, ...
MEDIAFORENSICS
2010
14 years 8 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
TASLP
2010
134views more  TASLP 2010»
14 years 4 months ago
Autoregressive Models of Amplitude Modulations in Audio Compression
We present a scalable medium bit-rate wide-band audio coding technique based on frequency domain linear prediction (FDLP). FDLP is an efficient method for representing the long-ter...
Sriram Ganapathy, Petr Motlícek, Hynek Herm...
COMPSAC
2009
IEEE
15 years 1 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye