Sciweavers

3527 search results - page 371 / 706
» Test Automation in Practice
Sort
View
ESOP
2005
Springer
15 years 10 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
DLOG
2000
15 years 5 months ago
Adapting Optimization Techniques to Description Logics with Concrete Domains
In this paper, we demonstrate that the main standard optimization techniques dependency directed backtracking and model merging can be adapted to description logics with concrete ...
Anni-Yasmin Turhan, Volker Haarslev
136
Voted
CSL
2010
Springer
15 years 4 months ago
Discriminative training of HMMs for automatic speech recognition: A survey
Recently, discriminative training (DT) methods have achieved tremendous progress in automatic speech recognition (ASR). In this survey article, all mainstream DT methods in speech...
Hui Jiang
ICIP
2004
IEEE
16 years 6 months ago
Action segmentation and recognition in meeting room scenarios
In this proposal a novel implementation to find and recognize person actions in image sequences of meeting scenarios is introduced. Such extracted information can be used as the b...
Frank Wallhoff, Martin Zobl, Gerhard Rigoll
101
Voted
ICIP
2003
IEEE
16 years 6 months ago
A Bayesian framework for recursive object removal in movie post-production
Some of the most convincing film and video effects are created in digital post-production by removing apparatus that supports or manipulates actors and objects. Wires and people, ...
Anil C. Kokaram, Bill Collis, Simon Robinson