Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








14 Hits in 4.7 sec

ProVeR: Probabilistic Video Retrieval using the Gauss-Tree

Christian Bohm, Michael Gruber, Peter Kunath, Alexey Pryakhin, Matthias Schubert
2007 2007 IEEE 23rd International Conference on Data Engineering  
The Gaussians are managed by the Gauss-tree, an index structure allowing the efficient processing of probabilistic queries.  ...  In this contribution, we propose ProVeR a prototype search engine for content-based video retrieval which represents a video as a set of Gaussians.  ...  The Gauss-tree is a dedicated index structure for efficiently managing Gaussian distributions. The Gauss-tree is used to speed up queries w.r.t. identification uncertainty.  ... 
doi:10.1109/icde.2007.369063 dblp:conf/icde/BohmGKPS07 fatcat:ayrugjsi2nca7aylvn6phagv7e

Mechanisms for Resilient Video Transmission [article]

Roger Immich, Eduardo Cerqueira, Marilia curado
2018 arXiv   pre-print
The advantages and drawbacks of the proposed mechanisms were demonstrated in realistic simulations using real video sequences and actual network traces.  ...  Real-time video services over these networks are becoming a part of everyday life and have been used to spread information ranging from education to entertainment content.  ...  To better reflect a UAV scenario, the Gauss-Markov distribution mobility model was used.  ... 
arXiv:1808.06722v1 fatcat:st3mju5poba4dh47w6tilelhte

A Systematic Literature Review about the impact of Artificial Intelligence on Autonomous Vehicle Safety [article]

A. M. Nascimento, L. F. Vismari, C. B. S. T. Molina, P.S. Cugnasca, J.B. Camargo Jr., J.R. de Almeida Jr., R. Inam, E. Fersman, M. V. Marquezini, A. Y. Hata
2019 arXiv   pre-print
Based on an initial sample of 4870 retrieved papers, 59 studies were selected as the result of the selection criteria detailed in the paper.  ...  The shortlisted studies were then mapped into six categories to answer the proposed research questions. An AV system model was proposed and applied to orient the discussions about the SLR findings.  ...  It formalised a coordination protocol and an intersection collision avoidance case study in the SMT-lib language and proved system safety using the Z3 theorem prover.  ... 
arXiv:1904.02697v1 fatcat:jsruqsy3kvcyvdyfhzo4ojfaqi

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication.  ...  Subscribers get paper copies and up-to-date electronic versions as well; subscription information may be found inside the back c o v er. The archives can be found at  ...  or family tree of viruses.  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

Multi-Core Memory Models and Concurrency Theory (Dagstuhl Seminar 11011) Feature-Oriented Software Development (FOSD) (Dagstuhl Seminar 11021) Multimodal Music Processing (Dagstuhl Seminar 11041) Learning from the Past: Implications for the Future Internet and its Management? (Dagstuhl Seminar 11042) Sparse Representations and Efficient Sensing of Data (Dagstuhl Seminar 11051)

Hans Boehm, Ursula Goltz, Holger Hermanns, Peter Sewell, Sven Apel, William Cook, Krzysztof Czarnecki, Oscar, Zhenjiang Hu, Andy Schürr, Perdita Stevens, James (+12 others)
2011 unpublished
All proofs (including the one showing soundness of our proof obligations) have been mechanically carried out using the interactive prover KIV.  ...  , tree database and tree database, and even graph database and graph database.  ...  The "User" group addressed the topic of user-aware music information retrieval. Actually, the perception of music is highly subjective and depends on the personal background and taste.  ... 
fatcat:qb35y6bggbe5fajaxnhn6mv72e

Proceedings of the 2023 Joint Workshop of the German Research Training Groups in Computer Science

:None, DuEPublico: Duisburg-Essen Publications Online, University Of Duisburg-Essen, Helmut Seidl, Christin Seifert
2023
For the 27th year, the annual Joint meeting Of the German Research Training Groups funded by the Deutsche Forschungsgemeinschaft (DFG) in the field of computer science took place at Schloss Dagstuhl –  ...  This volume documents the abstracts of the research topics of funded researchers in the participating RTGs.  ...  We like to show similar results for pricable vertices on both sides but if the underling graph has a special structure, e.g. if it is a path or a tree.  ... 
doi:10.17185/duepublico/78280 fatcat:pi6ux66kfbbptcqtvmi6b4zqom

Proceedings of the 2022 Joint Workshop of the German Research Training Groups in Computer Science

Felix Freiling, Helmut Seidl, 2022 2022 Joint Workshop Of The German Research Training Groups In Computer Science June 12–June 15
2022
Having spent two successive years running online to prevent the spread of the Corona virus, the traditional annual meeting of the German Research Training Groups (RTGs) funded by the Deutsche Forschungsgemeinschaft  ...  This volume documents the abstracts of the research topics of funded researchers in the participating RTGs.  ...  Finally, (RQ3) how can these features be integrated into the retrieval process to consider these factors during retrieval, aiming to get better answers using interactive information retrieval?  ... 
doi:10.25593/opus4-fau-19321 fatcat:ry4vd32xxbgldirrvymuaxxqwi

OASIcs, Volume 35, ICCSW'13, Complete Volume [article]

Andrew V. Jones, Nicholas Ng
2013
The author would like to thank José Fiadeiro for many useful discussions and feedback on the logic-programming semantics of services.  ...  Acknowledgements We thank the COPA 2013 reviewers for comments that improved the results of the paper. We are indebted to Royal Holloway, University of London, for continued support and funding.  ...  Usual methods guarantee a valid probabilistic outcome if the used distributions of features are correct.  ... 
doi:10.4230/oasics.iccsw.2013 fatcat:nzu3mwmc3bg47pgg6lmeygo7uu

Human Activity Recognition in Smart Environments (Dagstuhl Seminar 12492) Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501) Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502) Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511) Representation, Analysis and Visualization of Moving Objects (Dagstuhl Seminar 12512)

Susanne Biundo-Stephan, Hans Guesgen, Joachim Hertzberg, Stephen, James Crowley, Kai Kunze, Paul Lukowicz, Albrecht Schmidt, Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert (+11 others)
2012 unpublished
Learning event models from videos has applications ranging from abnormal event detection to content based video retrieval.  ...  These models can be used for recognizing events from unseen videos.  ...  What are the composition mechanisms? What properties are addressed? How are they specified? What kinds of verification techniques are used?  ... 
fatcat:lqejrqkk6fdhnnwiufoktwlf74

2012 Jahresbericht Annual Report Jahresbericht Annual Report

Kontakt Geschäftsstelle, Schloss Dagstuhl, Heike Clemens, Jutka Gasiorowski
2013 unpublished
Acknowledgments Many thanks to the Dagstuhl office and its helpful and patient staff; huge thanks to the organizers of the previous seminars in the series for setting us up for success; and thanks to all  ...  the participants, who worked hard and were amiable company all week.  ...  Decision trees give a good example of such objects: Given a proper visualization of the current tree, of some possible simplified or more complex versions and of the effect of the tree(s) on some dataset  ... 
fatcat:qmtsqeo23jcjffzwbvuoasqchq

Dagstuhl Reports, Volume 7, Issue 2, February 2017, Complete Issue [article]

2017
Acknowledgements: the working group would like to acknowledge useful suggestions from Shawn Newsam and Andrew Richardson. Frank Pennekamp (Universität Zürich, CH), Martin Bücker  ...  We present a theorem characterizing the notion of 1-genericity in terms of differentiable functions.  ...  We can apply the Gauss-Bonnet theorem to the metric on Σ coming from the map to R 2 .  ... 
doi:10.4230/dagrep.7.2 fatcat:ydwbggkkxjfahomhv75rjaguiy

OASIcs-OpenAccess Series in Informatics

Andrew Jones, Andrew Jones, Daniel Cremers, Barbara Hammer, Marc Langheinrich, Dorothea Wagner
1998 Conference Proceedings   unpublished
Acknowledgements The author would like to particularly thank his primary supervisor, Dr.  ...  Tomasz Radzik, for his insight and constructive comments at an earlier version of this article, and the anonymous reviewers for their valuable suggestions.  ...  The authors of [11] mention probabilistic models as methods that have also been used to retrieve and classify opinions from documents [3] .  ... 
fatcat:o5mmtkrtsnd4lpej5nww2zgpfe

Contract Testing for Reliable Embedded Systems

Raul Schmidlin Fajardo Silva
2013
Thanks to many discussions with people from different specific areas of the ECOMODIS project,  ...  Abgabedatum: Acknowledgments The experience of working on this project was rewarding and enriching.  ...  The system model used for reliability evaluation is based on probabilistic models that use component level failure rates as determined by their manufacturers for instance.  ... 
doi:10.11588/heidok.00015941 fatcat:2g6nmpletrd4jpcmopzvlvz4aa

Annual Report 2018
国立情報学研究所 平成30年度(2018年度)年報

,Sugiyama, M.: "Bias-Variance Trade-Off in Hierarchical Probabilistic Models Using Higher-Order Feature Interactions" ,Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI-19) (2019.01  ...  (ICMR2018), General Co-Chair, 2018. 4) IEEE Trans. on Circuits and Systems for Video Technology (TCSVT), Associate Editor, 2016-2020. 5) International Journal of Multimedia Information Retrieval, Editorial  ... 
doi:10.20736/0000001316 fatcat:ag6okeeknjeoxglo6j6yylm55y