Sciweavers

592 search results - page 97 / 119
» Can Component Service-Based Systems Be Proved Correct
Sort
View
CVPR
2008
IEEE
14 years 10 months ago
Action snippets: How many frames does human action recognition require?
Visual recognition of human actions in video clips has been an active field of research in recent years. However, most published methods either analyse an entire video and assign ...
Konrad Schindler, Luc J. Van Gool
ICML
2008
IEEE
14 years 9 months ago
Exploration scavenging
We examine the problem of evaluating a policy in the contextual bandit setting using only observations collected during the execution of another policy. We show that policy evalua...
John Langford, Alexander L. Strehl, Jennifer Wortm...
SADFE
2008
IEEE
14 years 3 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
LREC
2010
130views Education» more  LREC 2010»
13 years 10 months ago
Modified LTSE-VAD Algorithm for Applications Requiring Reduced Silence Frame Misclassification
The LTSE-VAD is one of the best known algorithms for voice activity detection. In this paper we present a modified version of this algorithm, that makes the VAD decision not takin...
Iker Luengo, Eva Navas, Igor Odriozola, Ibon Sarat...
ICMAS
1998
13 years 10 months ago
Implementation Issues on Market-Based QoS Control
In this paper, we discuss two major tradeoffs, spatial and temporal tradeoffs, that appear when applying marketbased computing to multimedia network applications. The former appea...
Hirofumi Yamaki, Yutaka Yamauchi, Toru Ishida