Sciweavers

2826 search results - page 197 / 566
» A resource-based analysis of IT sourcing
Sort
View
FGR
2002
IEEE
161views Biometrics» more  FGR 2002»
15 years 7 months ago
Baseline Results for the Challenge Problem of Human ID Using Gait Analysis
Identification of people from gait captured on video has become a challenge problem in computer vision. However, there is not a baseline algorithm or standard dataset for measuri...
P. Jonathon Phillips, Patrick Grother, Sudeep Sark...
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 6 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
SIGCOMM
1994
ACM
15 years 6 months ago
Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines
This paper discusses congestion control from a game-theoretic perspective. There are two basic premises: (1) users are assumed to be independent and sel sh, and (2) central admini...
Scott Shenker
ECSQARU
2007
Springer
15 years 5 months ago
Conflict Analysis and Merging Operators Selection in Possibility Theory
In possibility theory, the degree of inconsistency is commonly used to measure the level of conflict in information from multiple sources after merging, especially conjunctive merg...
Weiru Liu
ICMCS
2007
IEEE
177views Multimedia» more  ICMCS 2007»
15 years 5 months ago
Robust Analysis and Weighting on MFCC Components for Speech Recognition and Speaker Identification
Mismatch between training and testing data is a major error source for both Automatic Speech Recognition (ASR) and Automatic Speaker Identification (ASI). In this paper, we first ...
Xi Zhou, Yun Fu, Ming Liu, Mark Hasegawa-Johnson, ...