Sciweavers

861 search results - page 105 / 173
» Predicting Attack-prone Components
Sort
View
SOCA
2010
IEEE
13 years 8 months ago
Short-term performance management by priority-based queueing
Service-based IT infrastructures serve many different business processes on a shared infrastructure in parallel. The automated request execution on the interconnected software com...
Christian Markl, Oliver Hühn, Martin Bichler
NAACL
2010
13 years 8 months ago
A Direct Syntax-Driven Reordering Model for Phrase-Based Machine Translation
This paper presents a direct word reordering model with novel syntax-based features for statistical machine translation. Reordering models address the problem of reordering source...
Niyu Ge
INTERSPEECH
2010
13 years 5 months ago
Prosody and voice quality of vocal social signals: the case of dominance in scenario meetings
In this paper we investigate the prosody and voice quality of dominance in scenario meetings. We have found that in these scenarios the most dominant person tends to speak with a ...
Marcela Charfuelan, Marc Schröder, Ingmar Ste...
ICASSP
2011
IEEE
13 years 2 months ago
A Kalman-like algorithm with no requirements for noise and initial conditions
We address a Kalman-like estimator for solving universally the problems of filtering (p = 0), prediction (p > 0), and smoothing (p < 0) of discrete time-varying state-space...
Yuriy S. Shmaliy
ICASSP
2011
IEEE
13 years 2 months ago
A probabilistic pixel-based approach to detect humans in video streams
Human detection in video streams is an important task in many applications including video surveillance. Surprisingly, only few papers have been devoted to this topic. This paper ...
Sébastien Piérard, Antoine Lejeune, ...