Sciweavers

1332 search results - page 71 / 267
» ideas 2008
Sort
View
COMPSEC
2004
115views more  COMPSEC 2004»
14 years 11 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
CVIU
2004
114views more  CVIU 2004»
14 years 11 months ago
Illumination insensitive recognition using eigenspaces
Variations in illumination can have a dramatic effect on the appearance of an object in an image. In this paper, we propose how to deal with illumination variations in eigenspace ...
Horst Bischof, Horst Wildenauer, Ales Leonardis
CCR
2002
85views more  CCR 2002»
14 years 11 months ago
The influence of ATM on operating systems
The features of ATM offered many attractions to the application community, such as fine-grained multiplexing and high-throughput links. These created considerable challenges for t...
Jonathan M. Smith
COLING
2000
14 years 11 months ago
Processing Self Corrections in a speech to speech system
Speech repairs occur often in spontaneous spoken dialogues. The ability to detect and correct those repairs is necessary for any spoken language system. We present a framework to ...
Jörg Spilker, Martin Klarner, Günther G&...
SIGKDD
2000
106views more  SIGKDD 2000»
14 years 11 months ago
Data Mining Models as Services on the Internet
The goal of this article is to raise a debate on the usefulness of providing data mining models as services on the internet. These services can be provided by anyone with adequate...
Sunita Sarawagi, Sree Hari Nagaralu