The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new approach for the person re-identification problem, discovering the correct matches for a query pedestrian image from a set of gallery images. It is well motivated by our observation that the overall complex inter-camera transformation, caused by the change of camera viewpoints, person poses and view illuminations, can be effectively modelled by a combination of many...
The Mandarin speech always involves a rich set of regional accents, so that modeling the acoustic variabilities imposed by accents is a challenging task for Mandarin speech recognition. This work investigated using limited accented data to design a multi-accent decision tree, so as to improve the recognition accuracy of traditional GMM-HMM systems. Moreover, the deep neural networks with senone/monophone...
In silicon testing, a Shmoo plot is commonly used to give us an insight into the silicon manufacturing development health. Shmoo plots and other silicon characterization data has high value, however, analysis of them is a time-consuming work. This paper establishes a machine learning based model to improve and automate the procedure in silicon data analysis for HVM test content development. Our experiment...
Extracting attributes from network traffic is the first step of network intrusion detection. However, the question of what attributes are most effective for the detection still remains. In this paper, we employed information gain, wrapper with Bayesian networks (BN) and decision trees (C4.5) respectively to select key subsets of attributes for network intrusion detection based on KDD Cup 1999 data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.