Sciweavers

20833 search results - page 131 / 4167
» Hidden process models
Sort
View
P2P
2008
IEEE
15 years 9 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...
130
Voted
INTERSPEECH
2010
14 years 10 months ago
Deep-structured hidden conditional random fields for phonetic recognition
We extend our earlier work on deep-structured conditional random field (DCRF) and develop deep-structured hidden conditional random field (DHCRF). We investigate the use of this n...
Dong Yu, Li Deng
ICML
2003
IEEE
16 years 3 months ago
Hidden Markov Support Vector Machines
This paper presents a novel discriminative learning technique for label sequences based on a combination of the two most successful learning algorithms, Support Vector Machines an...
Yasemin Altun, Ioannis Tsochantaridis, Thomas Hofm...
ICPR
2008
IEEE
15 years 9 months ago
A Hidden Markov Model-based continuous gesture recognition system for hand motion trajectory
In this paper, we propose an automatic system that recognizes both isolated and continuous gestures for Arabic numbers (0-9) in real-time based on Hidden Markov Model (HMM). To ha...
Mahmoud Elmezain, Ayoub Al-Hamadi, Jörg Appen...
129
Voted
CORR
2010
Springer
118views Education» more  CORR 2010»
15 years 3 months ago
Automatically Discovering Hidden Transformation Chaining Constraints
Abstract. Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transforma...
Raphaël Chenouard, Frédéric Jou...