Sciweavers

1486 search results - page 136 / 298
» Algorithms for two-box covering
Sort
View
JCIT
2010
146views more  JCIT 2010»
14 years 11 months ago
Determing Performance of Choreography-based Composite Services
Web Service Choreography Description Language is a main-stream standard for the description of peer-to-peer collaborations for the participants for service composition. To predict...
Yunni Xia, Zhe Ouyang, Yanxin Wu, Ruilong Yang
JMLR
2010
144views more  JMLR 2010»
14 years 11 months ago
Maximum Margin Learning with Incomplete Data: Learning Networks instead of Tables
In this paper we address the problem of predicting when the available data is incomplete. We show that changing the generally accepted table-wise view of the sample items into a g...
Sándor Szedmák, Yizhao Ni, Steve R. ...
PAMI
2010
207views more  PAMI 2010»
14 years 11 months ago
Document Ink Bleed-Through Removal with Two Hidden Markov Random Fields and a Single Observation Field
We present a new method for blind document bleed through removal based on separate Markov Random Field (MRF) regularization for the recto and for the verso side, where separate pri...
Christian Wolf
SPEECH
2010
154views more  SPEECH 2010»
14 years 11 months ago
Long story short - Global unsupervised models for keyphrase based meeting summarization
act 11 We analyze and compare two different methods for unsupervised extractive spontaneous speech summarization in the meeting 12 domain. Based on utterance comparison, we introdu...
Korbinian Riedhammer, Benoît Favre, Dilek Ha...
150
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 10 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...