نتایج جستجو برای: end

تعداد نتایج: 400603  

2008
J. R. Inge Capt. G. T. Costello

Audits have long been used as a tool for checking that safety management processes are being followed and system safety principles applied, to provide senior managers with assurance that safe outcomes occur by design and not by luck. In a complex hierarchical organisation, the tendency is for audits to concentrate on safety management systems based on individual units within the hierarchy, rath...

2016
Raymond Smith Chunhui Gu Dar-Shyang Lee Huiyi Hu Ranjith Unnikrishnan Julian Ibarz Sacha Arnoud Sophia Lin

We introduce the French Street Name Signs (FSNS) Dataset consisting of more than a million images of street name signs cropped from Google Street View images of France. Each image contains several views of the same street name sign. Every image has normalized, title case folded ground-truth text as it would appear on a map. We believe that the FSNS dataset is large and complex enough to train a...

2000
Clementina Tocci Paolo Conforto Giacinto Losquadro Francesco Delli Priscoli Mauro Femminella

This paper discusses IP end-to-end QoS support issues addressed in the IST SUITED project whose main goal is to design and validate a complemented satellite/terrestrial broadband communication infrastructure able to provide mobile and portable, QoS guaranteed, Internet services.

2002
Yuan-Chi Chang Richard Han Chung-Sheng Li John R. Smith

In this paper, we introduce a secure transcoding framework that enables network intermediaries such as proxies to transcode multimedia data without violating end-to-end security guarantees. In our approach, an encoder decomposes a data stream at the source into multiple streams, encrypts each stream independently, and annotates each stream with clear-text metadata. An intermediary performs tran...

2008
Stefan Lindskog Anna Brunstrom

A comparison of three different end-to-end security solutions for the stream control transmission protocol (SCTP) is presented in this paper. The compared solutions are SCTP over IPsec, TLS over SCTP, and secure socket SCTP (SS-SCTP). The two former are standardized solutions, whereas the latter is a newly proposed solution that was designed to offer as much security differentiation support as ...

2010
Patrick D. McDaniel Kevin R. B. Butler Stephen E. McLaughlin Radu Sion Erez Zadok Marianne Winslett

Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) “Where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”; (2) “How do I extend completeness and accuracy guarantees to distributed systems and computations?”; and (3) “What ar...

2014
Klaus Zechner Keelan Evanini Su-Youn Yoon Lawrence Davis Xinhao Wang Lei Chen Chong Min Lee Chee Wee Leong

This paper describes an end-to-end prototype system for automated scoring of spoken responses in a novel assessment for teachers of English as a Foreign Language who are not native speakers of English. The 21 speaking items contained in the assessment elicit both restricted and moderately restricted responses, and their aim is to assess the essential speaking skills that English teachers need i...

2001
Volker Hilt Martin Mauve Wolfgang Effelsberg

With the increasing popularity of MBone conferences, the need arose to archive the multimedia streams of these conferences. Like all network applications, a conference recorder is subject to packet loss, which introduces gaps into recorded media streams. Such gaps degrade the playback quality of an archived media stream or even disable the correct playback. In this paper, we present a novel sch...

2012
Pascal Kuyten Timothy W. Bickmore Svetlana Stoyanchev Paul Piwek Helmut Prendinger Mitsuru Ishizuka

We introduce a novel approach for automatically generating a virtual instructor from textual input only. Our fully implemented system first analyzes the rhetorical structure of the input text and then creates various questionanswer pairs using patterns. These patterns have been derived from correlations found between rhetorical structure of monologue texts and question-answer pairs in the corre...

2010
Jeff Orkin Deb K. Roy

The Restaurant Game demonstrates an end-to-end system that captures and generates social behavior for virtual agents. Over 15,000 people have played The Restaurant Game, and we have developed a system to automatically learn patterns of interaction and dialogue from logs of their gameplay sessions. These patterns guide a case-based planning system, which generates behavior and dialogue for a vir...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید