نتایج جستجو برای: end
تعداد نتایج: 400603 فیلتر نتایج به سال:
Audits have long been used as a tool for checking that safety management processes are being followed and system safety principles applied, to provide senior managers with assurance that safe outcomes occur by design and not by luck. In a complex hierarchical organisation, the tendency is for audits to concentrate on safety management systems based on individual units within the hierarchy, rath...
We introduce the French Street Name Signs (FSNS) Dataset consisting of more than a million images of street name signs cropped from Google Street View images of France. Each image contains several views of the same street name sign. Every image has normalized, title case folded ground-truth text as it would appear on a map. We believe that the FSNS dataset is large and complex enough to train a...
This paper discusses IP end-to-end QoS support issues addressed in the IST SUITED project whose main goal is to design and validate a complemented satellite/terrestrial broadband communication infrastructure able to provide mobile and portable, QoS guaranteed, Internet services.
In this paper, we introduce a secure transcoding framework that enables network intermediaries such as proxies to transcode multimedia data without violating end-to-end security guarantees. In our approach, an encoder decomposes a data stream at the source into multiple streams, encrypts each stream independently, and annotates each stream with clear-text metadata. An intermediary performs tran...
A comparison of three different end-to-end security solutions for the stream control transmission protocol (SCTP) is presented in this paper. The compared solutions are SCTP over IPsec, TLS over SCTP, and secure socket SCTP (SS-SCTP). The two former are standardized solutions, whereas the latter is a newly proposed solution that was designed to offer as much security differentiation support as ...
Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) “Where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”; (2) “How do I extend completeness and accuracy guarantees to distributed systems and computations?”; and (3) “What ar...
This paper describes an end-to-end prototype system for automated scoring of spoken responses in a novel assessment for teachers of English as a Foreign Language who are not native speakers of English. The 21 speaking items contained in the assessment elicit both restricted and moderately restricted responses, and their aim is to assess the essential speaking skills that English teachers need i...
With the increasing popularity of MBone conferences, the need arose to archive the multimedia streams of these conferences. Like all network applications, a conference recorder is subject to packet loss, which introduces gaps into recorded media streams. Such gaps degrade the playback quality of an archived media stream or even disable the correct playback. In this paper, we present a novel sch...
We introduce a novel approach for automatically generating a virtual instructor from textual input only. Our fully implemented system first analyzes the rhetorical structure of the input text and then creates various questionanswer pairs using patterns. These patterns have been derived from correlations found between rhetorical structure of monologue texts and question-answer pairs in the corre...
The Restaurant Game demonstrates an end-to-end system that captures and generates social behavior for virtual agents. Over 15,000 people have played The Restaurant Game, and we have developed a system to automatically learn patterns of interaction and dialogue from logs of their gameplay sessions. These patterns guide a case-based planning system, which generates behavior and dialogue for a vir...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید