نتایج جستجو برای: level multi

تعداد نتایج: 1485314  

2014
Tom Sie Ho Lee Sanja Fidler Sven J. Dickinson

Region proposal methods provide richer object hypotheses than sliding windows with dramatically fewer proposals, yet they still number in the thousands. This large quantity of proposals typically results from a diversification step that propagates bottom-up ambiguity in the form of proposals to the next processing stage. In this paper, we take a complementary approach in which mid-level knowled...

2015
Gregg Podnar John Dolan Alberto Elfes Marcel Bergerman

This paper focuses on the development of an advanced telesupervision system architecture that supports a highly efficient approach to human-robot interaction while allowing heterogeneous robotic assets to be deployed. The described multi-level framework not only supports human monitoring and control of existing state-of-the-art autonomous agents, but also allows new autonomous agents to be inco...

2003
Franz G. Amador

Many systems are too complex to represent with a single, detailed model because the model simply becomes too cumbersome . This is especially true when reasoning about populations composed of many interacting individuals . A fully-detailed model of such a system would have to model all the interactions between a potentially enormous number of individuals. Frequently, however, these interactions ...

2011
Yong Wang Hao Wu Weihua Zhang Yanwei Li Aleksandar Kuzmanovic

Hundreds of millions of users are attracted to many of the thriving Internet applications and services, such as e-mail, online social networking, or video sharing. In an attempt to effectively serve the large number of users, the application providers started deploying their own application-specific network infrastructures. We demonstrate that the significant proliferation of applications and t...

Journal: :IACR Cryptology ePrint Archive 2008
Mira Belenkiy

A disjunctive multi-level secret sharing scheme divides users into different levels. Each level L is associated with a threshold tL, and a group of users can only recover the secret if, for some L, there are at least tL users at levels 0....L in the group. We present a simple ideal disjunctive multi-level secret sharing scheme – in fact, the simplest and most direct scheme to date. It is the fi...

Journal: :CoRR 2016
Roberto Henschel Laura Leal-Taixé Bodo Rosenhahn Konrad Schindler

We present a novel formulation of the multiple object tracking problem which integrates low and mid-level features. In particular, we formulate the tracking problem as a quadratic program coupling detections and dense point trajectories. Due to the computational complexity of the initial QP, we propose an approximation by two auxiliary problems, a temporal and spatial association, where the tem...

Journal: :IJBIDM 2012
Qiang Jiang Akiko Campbell Guanting Tang Jian Pei

Relationship management is critical in business. Particularly, it is important to detect abnormal relationships, such as fraudulent relationships between service providers and consumers. Surprisingly, in the literature there is no systematic study on detecting relationship outliers. Particularly, no existing methods can detect and handle relationship outliers between groups and individuals in g...

2010
Christoph Elsner Christa Schwanninger Wolfgang Schröder-Preikschat Daniel Lohmann

Managing and developing a set of software products jointly using a software product line approach has achieved significant productivity and quality gain in the last decade. More and more, product lines now are becoming themselves entities that are sold and bought in the software supply chain. Customers build more specialized product lines on top of them or derive themselves the concrete product...

2017
Sarah Louise Renwick James Alderman Keith M. Martin

Remote storage delivers a cost effective solution for data storage. If data is of a sensitive nature, it should be encrypted prior to outsourcing to ensure confidentiality; however, searching then becomes challenging. Searchable encryption is a well-studied solution to this problem. Many schemes only consider the scenario where users can search over the entirety of the encrypted data. In practi...

2004
Alexander Clark Andrei Popescu-Belis

In this paper we discuss the use of multilayered tagsets for dialogue acts, in the context of dialogue understanding for multiparty meeting recording and retrieval applications. We discuss some desiderata for such tagsets and critically examine some previous proposals. We then define MALTUS, a new tagset based on the ICSI-MR and Switchboard tagsets, which satisfies these requirements. We presen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید