Sciweavers

1585 search results - page 245 / 317
» Using a Non-prior Training Active Feature Model
Sort
View
ICASSP
2009
IEEE
15 years 1 months ago
Social correlates of turn-taking behavior
The goal of this research is to infer traits about groups of people from their turn-taking behavior in natural conversation. These traits are latent attributes in a social network...
John Grothendieck, Allen L. Gorin, Nash M. Borges
JDCTA
2010
126views more  JDCTA 2010»
14 years 10 months ago
Continuous Neural Decoding Method Based on General Regression Neural Network
Neural decoding is an important task for understanding how the biological nervous system performs computation and communication. This paper introduces a novel continuous neural de...
Jianhua Dai, Xiaochun Liu, Shaomin Zhang, Huaijian...
ISMIS
2005
Springer
15 years 8 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ICMI
2009
Springer
105views Biometrics» more  ICMI 2009»
15 years 10 months ago
Grounding spatial prepositions for video search
Spatial language video retrieval is an important real-world problem that forms a test bed for evaluating semantic structures for natural language descriptions of motion on natural...
Stefanie Tellex, Deb Roy
106
Voted
ISMIR
2004
Springer
100views Music» more  ISMIR 2004»
15 years 8 months ago
Well-Tempered Spelling: A Key Invariant Pitch Spelling Algorithm
In this paper is described a data-driven algorithm for the functionally correct spelling of MIDI pitch values in terms of Western musical notation. Input is in the form of MIDI fi...
Josh Stoddard, Christopher Raphael, Paul E. Utgoff