Sciweavers

1759 search results - page 295 / 352
» Using term informativeness for named entity detection
Sort
View
ESOP
2008
Springer
14 years 11 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
ECIR
2009
Springer
15 years 7 months ago
Exploiting Visual Concepts to Improve Text-Based Image Retrieval
In this paper, we study how to automatically exploit visual concepts in a text-based image retrieval task. First, we use Forest of Fuzzy Decision Trees (FFDTs) to automatically ann...
Sabrina Tollari, Marcin Detyniecki, Christophe Mar...
IUI
2006
ACM
15 years 3 months ago
Head gesture recognition in intelligent interfaces: the role of context in improving recognition
Acknowledging an interruption with a nod of the head is a natural and intuitive communication gesture which can be performed without significantly disturbing a primary interface ...
Louis-Philippe Morency, Trevor Darrell
ASSETS
2009
ACM
15 years 4 months ago
Instant tactile-audio map: enabling access to digital maps for people with visual impairment
In this paper, we propose an automatic approach, complete with a prototype system, for supporting instant access to maps for local navigation by people with visual impairment. The...
Zheshen Wang, Baoxin Li, Terri Hedgpeth, Teresa Ha...
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...