Intermediate Representations of Mobile Code
暂无分享,去创建一个
[1] MengChu Zhou,et al. Modeling, Simulation, and Control of Flexible Manufacturing Systems - A Petri Net Approach , 1999, Series in Intelligent Control and Intelligent Automation.
[2] Furio Honsell,et al. A framework for defining logics , 1993, JACM.
[3] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[4] Mark Sanderson,et al. Information retrieval system evaluation: effort, sensitivity, and reliability , 2005, SIGIR '05.
[5] Falk Scholer,et al. User performance versus precision measures for simple search tasks , 2006, SIGIR.
[6] Richard M. Schwartz,et al. A compact model for speaker-adaptive training , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.
[7] MuDer Jeng,et al. Process nets with resources for manufacturing modeling and their analysis , 2002, IEEE Trans. Robotics Autom..
[8] Neil J. Gordon,et al. A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking , 2002, IEEE Trans. Signal Process..
[9] King Sing Cheung,et al. A Synthesis Approach to Deriving Object-Based Specifications from Object Interaction Scenarios , 2006 .
[10] France Mihelic,et al. Development of Slovenian Broadcast News Speech Database , 2004, LREC.
[11] Tiziana D'Orazio,et al. Human Activity Recognition in Archaeological Sites by Hidden Markov Models , 2004, PCM.
[12] Luke Fletcher,et al. An adaptive fusion architecture for target tracking , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.
[13] Ravindra B. Keskar,et al. Compiling Safe Mobile Code , 2002, The Compiler Design Handbook.
[14] Lawrence B. Wolff,et al. Tracking human faces in infrared video , 2003, Image Vis. Comput..
[15] John H. L. Hansen,et al. Unsupervised audio stream segmentation and clustering via the Bayesian information criterion , 2000, INTERSPEECH.
[16] Trevor Darrell,et al. Multiple person and speaker activity tracking with a particle filter , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[17] David Hawking,et al. Overview of the TREC 2003 Web Track , 2003, TREC.
[18] Jean-Luc Gauvain,et al. Multistage speaker diarization of broadcast news , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[19] Shih-Schon Lin. Review: Extending Visible Band Computer Vision Techniques to Infrared Band Images , 2001 .
[20] Clemente Ibarra-Castanedo,et al. Advanced surveillance systems: combining video and thermal imagery for pedestrian detection , 2004, SPIE Defense + Commercial Sensing.
[21] Guillaume Gravier,et al. Experiments on speaker tracking and segmentation in radio broadcast news , 2005, INTERSPEECH.
[22] David Gregg,et al. The case for virtual register machines , 2003, IVME '03.
[23] Sharath Pankanti,et al. Appearance models for occlusion handling , 2006, Image Vis. Comput..
[24] George C. Necula,et al. The design and implementation of a certifying compiler , 1998, PLDI.
[25] Jeffery von Ronne,et al. An Inherently Type-Safe SSA-based Code Format , 2006 .
[26] Harriet J. Nock,et al. Assessing face and speech consistency for monologue detection in video , 2002, MULTIMEDIA '02.
[27] Richard M. Schwartz,et al. Practical Implementations of Speaker-Adaptive Training , 1997 .
[28] Galina L. Rogova,et al. Reliability In Information Fusion : Literature Survey , 2004 .
[29] M. de Rijke,et al. Overview of WebCLEF 2005 , 2005, CLEF.
[30] Ankush Mittal. An Overview of Multimedia Content-Based Retrieval Strategies , 2006, Informatica.
[31] Egon Börger,et al. Java and the Java Virtual Machine: Definition, Verification, Validation , 2001 .
[32] Dan Istrate,et al. Broadcast news speaker tracking for ESTER 2005 campaign , 2005, INTERSPEECH.
[33] Nebojsa Jojic,et al. Audio-visual graphical models for speech processing , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[34] Takeo Kanade,et al. A System for Video Surveillance and Monitoring , 2000 .
[35] Albert J. Ahumada,et al. Sensor fusion for synthetic vision , 1991 .
[36] Karsten Sohr. Die Sicherheitsaspekte von mobilem Code , 2001 .
[37] Andy Nisbet,et al. The case for virtual register machines , 2005, Sci. Comput. Program..
[38] France Mihelic,et al. Speech/Non-Speech Segmentation Based on Phoneme Recognition Features , 2006, EURASIP J. Adv. Signal Process..
[39] Frank Yellin,et al. The Java Virtual Machine Specification , 1996 .
[40] J. L. Roux. An Introduction to the Kalman Filter , 2003 .
[41] Fredric C. Gey,et al. GeoCLEF 2008: the CLEF 2008 Cross-Language Geographic Information Retrieval Track Overview , 2008, CLEF.
[42] Bertil Folliot,et al. Beyond Flexibility and Reflection: The Virtual Virtual Machine Approach , 2001, IWCC.
[43] Andrew David Marshall,et al. A data fusion system for object recognition based on transferable belief models and kalman filters , 2004 .
[44] Yuan-Fang Wang,et al. Real-time multiperson tracking in video surveillance , 2003, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.
[45] P. J. Escamilla-Ambrosio,et al. A hybrid Kalman filter-fuzzy logic architecture for multisensor data fusion , 2001, Proceeding of the 2001 IEEE International Symposium on Intelligent Control (ISIC '01) (Cat. No.01CH37206).
[46] Carlo S. Regazzoni,et al. Content-based retrieval and real time detection from video sequences acquired by surveillance systems , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[47] ScienceYale UniversityNew Haven. An Overview of the Flint/ml Compiler , 1997 .
[48] Christian Fabre,et al. Verification of ANDF components , 1995, IR '95.
[49] Robert W. Floyd,et al. Assigning Meanings to Programs , 1993 .
[50] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[51] Ramesh A. Gopinath,et al. Improved speaker segmentation and segments clustering using the bayesian information criterion , 1999, EUROSPEECH.
[52] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[53] Nipun Kwatra,et al. A Framework for Activity Recognition and Detection of Unusual Activities , 2004, ICVGIP.
[54] Dan Grossman,et al. Scalable Certification of Native Code: Experience from Compiling to TALx86 , 2000 .
[55] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.
[56] Pat Langley,et al. Elements of Machine Learning , 1995 .
[57] Michael J. Brooks,et al. Issues in Automated Visual Surveillance , 2003, DICTA.
[58] Douglas A. Reynolds,et al. The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective , 2000, Speech Commun..
[59] Dan Grossman,et al. Syntactic type abstraction , 2000, TOPL.
[60] Tommy Thorne,et al. Programming languages for mobile code , 1997, CSUR.
[61] Jean-François Bonastre,et al. Evolutive HMM for multi-speaker tracking system , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[62] R. Cucchiara. Multimedia surveillance systems , 2005, VSSN@MM.
[63] Christian Wellekens,et al. A speaker tracking system based on speaker turn detection for NIST evaluation , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[64] Mohan S. Kankanhalli,et al. Information assimilation framework for event detection in multimedia surveillance systems , 2006, Multimedia Systems.
[65] Jeffery von Ronne,et al. Code Annotation for Safe and Efficient Dynamic Object Resolution , 2003, Electron. Notes Theor. Comput. Sci..
[66] Robert Wahbe,et al. Efficient and language-independent mobile programs , 1996, PLDI '96.
[67] George C. Necula,et al. Compiling with proofs , 1998 .
[68] King Sing Cheung,et al. New characterization for live and reversible augmented marked graphs , 2004, Inf. Process. Lett..
[69] Jeffery von Ronne,et al. SSA-based mobile code: Implementation and empirical evaluation , 2007, TACO.
[70] James Mayfield,et al. Character N-Gram Tokenization for European Language Text Retrieval , 2004, Information Retrieval.
[71] Howard D. Wactlar,et al. Combining motion segmentation with tracking for activity analysis , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..
[72] Carol Peters,et al. CLEF 2007: Ad Hoc Track Overview , 2008, CLEF.
[73] T. Y. Cheung,et al. A petri-net-based synthesis methodology for use-case-driven system design , 2006, J. Syst. Softw..
[74] Dean A. Scribner,et al. Image fusion for tactical applications , 1998, Optics & Photonics.
[75] B. Ripley,et al. Pattern Recognition , 1968, Nature.
[76] Ellen M. Voorhees,et al. The TREC robust retrieval track , 2005, SIGF.
[77] James W. Davis,et al. Robust detection of people in thermal imagery , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[78] Roland Auckenthaler,et al. Score Normalization for Text-Independent Speaker Verification Systems , 2000, Digit. Signal Process..
[79] Dan Grossman,et al. Scalable Certification for Typed Assembly Language , 2000, Types in Compilation.
[80] James E. Black,et al. A novel method for video tracking performance evaluation , 2003 .
[81] M. de Rijke,et al. Blueprint of a Cross-Lingual Web Retrieval Collection , 2005, J. Digit. Inf. Manag..
[82] Chin-Hui Lee,et al. Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains , 1994, IEEE Trans. Speech Audio Process..
[83] Masahiko Yachida,et al. Multiple-view-based tracking of multiple humans , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).
[84] Kentaro Toyama,et al. Wallflower: principles and practice of background maintenance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[85] K. John Gough. Stacking them up: a comparison of virtual machines , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.
[86] Iwan Ulrich,et al. The GuideCane-applying mobile robot technologies to assist the visually impaired , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[87] D-IOOO Berlin,et al. TWO AXIOMS FOR EVALUATION MEASURES IN INFORMATION RETRIEVAL , 2001 .
[88] W. Amme,et al. Improving the Java Virtual Machine Using Type-Separated Bytecode , 2006 .
[89] George C. Necula,et al. A Proof-Carrying Code Architecture for Java , 2000, CAV.
[90] Janez Zibert,et al. Novel Approaches to Speech Detection in the Processing of Continuous Audio Streams , 2007 .
[91] S. Chen,et al. Speaker, Environment and Channel Change Detection and Clustering via the Bayesian Information Criterion , 1998 .
[92] Peter Clark,et al. The CN2 Induction Algorithm , 1989, Machine Learning.
[93] Peter Clark,et al. Rule Induction with CN2: Some Recent Improvements , 1991, EWSL.
[94] Vladimir Pavlovic,et al. Visual Interpretation of Hand Gestures for Human-Computer Interaction: A Review , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[95] Jean-Luc Gauvain,et al. Partitioning and transcription of broadcast news data , 1998, ICSLP.
[96] Jim des Rivières,et al. Eclipse: A platform for integrating development tools , 2004, IBM Syst. J..
[97] Kathleen Jensen,et al. Pascal-P Implementation Notes , 1981, Pascal - The Language and its Implementation.
[98] Nada Lavrac,et al. Expert-Guided Subgroup Discovery: Methodology and Application , 2011, J. Artif. Intell. Res..
[99] Atsushi Nakazawa,et al. Human tracking using distributed vision systems , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).
[100] Gérard Chollet,et al. The Elisa'99 Speaker Recognition and Tracking Systems , 1999 .
[101] Matthew Arnold,et al. Adaptive optimization in the Jalapeño JVM , 2000, OOPSLA '00.
[102] Jeffery von Ronne,et al. SafeTSA: a type safe and referentially secure mobile-code representation based on static single assignment form , 2001, PLDI '01.
[103] Rama Chellappa,et al. Human and machine recognition of faces: a survey , 1995, Proc. IEEE.
[104] George C. Necula,et al. A certifying compiler for Java , 2000, PLDI '00.
[105] Zhigang Zhu,et al. Integrating LDV Audio and IR Video for Remote Multimodal Surveillance , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.
[106] Michael Franz. The Java Virtual Machine: A Passing Fad? , 1998, IEEE Softw..
[107] Alberto Broggi,et al. Pedestrian detection in infrared images , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).
[108] Rita Cucchiara,et al. Using computer vision techniques for dangerous situation detection in domotic applications , 2004 .
[109] Jean-Luc Gauvain,et al. Combining speaker identification and BIC for speaker diarization , 2005, INTERSPEECH.
[110] France Mihelic,et al. Robust Speech Detection Based on Phoneme Recognition Features , 2006, TSD.
[111] A. Mittal,et al. A Multimodal Audio Visible and Infrared Surveillance System (MAVISS) , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[112] Sameer Singh,et al. Video analysis of human dynamics - a survey , 2003, Real Time Imaging.
[113] Philippe Smets,et al. Data association in multi‐target detection using the transferable belief model , 2001, Int. J. Intell. Syst..
[114] Sridha Sridharan,et al. Feature warping for robust speaker verification , 2001, Odyssey.
[115] Sergio A. Velastin,et al. Intelligent distributed surveillance systems: a review , 2005 .
[116] Zoran Bosnic. Estimation of Individual Prediction Reliability Using Sensitivity Analysis of Regression Models , 2008, Informatica.
[117] Giorgio Maria Di Nunzio,et al. How robust are multilingual information retrieval systems? , 2008, SAC '08.
[118] Joel H. Blatt,et al. Undersea object detection and recognition: the use of spatially and temporally varying coherent illumination , 1999, Oceans '99. MTS/IEEE. Riding the Crest into the 21st Century. Conference and Exhibition. Conference Proceedings (IEEE Cat. No.99CH37008).
[119] Xia Liu,et al. Pedestrian detection and tracking with night vision , 2005, IEEE Transactions on Intelligent Transportation Systems.
[120] André Elisseeff,et al. Stability and Generalization , 2002, J. Mach. Learn. Res..
[121] King Sing Cheung,et al. Cycle inclusion property of augmented marked graphs , 2005, Inf. Process. Lett..
[122] Michael Franz,et al. Slim binaries , 1997, CACM.
[123] Jun Li. SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES , 2010 .
[124] Min Chen,et al. Semantic event detection via multimodal data mining , 2006, IEEE Signal Processing Magazine.
[125] Ali S. Hadi,et al. Finding Groups in Data: An Introduction to Chster Analysis , 1991 .
[126] Pramod K. Varshney,et al. Sensor Fusion for Video Surveillance , 2004 .
[127] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[128] MuDer Jeng,et al. Manufacturing modeling using process nets with resources , 2000, Proceedings 2000 ICRA. Millennium Conference. IEEE International Conference on Robotics and Automation. Symposia Proceedings (Cat. No.00CH37065).
[129] Douglas A. Reynolds,et al. An overview of automatic speaker diarization systems , 2006, IEEE Transactions on Audio, Speech, and Language Processing.
[130] Alexander Gammerman,et al. Transduction with Confidence and Credibility , 1999, IJCAI.
[131] Guy L. Steele,et al. Java Language Specification, Second Edition: The Java Series , 2000 .
[132] George C. Necula,et al. Research on proof-carrying code for untrusted-code security , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[133] Michael Franz,et al. Continuous program optimization , 1999 .
[134] James W. Davis,et al. Fusion-Based Background-Subtraction using Contour Saliency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.
[135] Kamel Barkaoui,et al. On Liveness in Extended non Self-Controlling Nets , 1995, Application and Theory of Petri Nets.
[136] Thomas Mandl,et al. The effect of named entities on effectiveness in cross-language information retrieval evaluation , 2005, SAC '05.
[137] John Gough,et al. Technical Overview of the Common Language Runtime , 2001 .
[138] Alan F. Smeaton,et al. Multispectral Object Segmentation and Retrieval in Surveillance Video , 2006, 2006 International Conference on Image Processing.
[139] Trevor Darrell,et al. Nearest-Neighbor Methods in Learning and Vision , 2008, IEEE Trans. Neural Networks.
[140] David J. Fleet,et al. Performance of optical flow techniques , 1994, International Journal of Computer Vision.
[141] Ankush Mittal,et al. Fusion of Thermal Infrared and Visible Spectrum Video for Robust Surveillance , 2006, ICVGIP.
[142] David Gregg,et al. Virtual machine showdown: stack versus registers , 2005, VEE '05.
[143] David L. Dill,et al. Faster Proof Checking in the Edinburgh Logical Framework , 2002, CADE.
[144] Steve Young,et al. Segment generation and clustering in the HTK broadcast news transcription system , 1998 .
[145] Igor Kononenko,et al. Estimation of individual prediction reliability using the local sensitivity analysis , 2008, Applied Intelligence.
[146] Jürg Kohlas,et al. Handbook of Defeasible Reasoning and Uncertainty Management Systems , 2000 .
[147] Michael Franz,et al. A Tree-Based Alternative to Java Byte-Codes , 1999, International Journal of Parallel Programming.
[148] João Paulo da Silva Neto,et al. The COST278 broadcast news segmentation and speaker clustering evaluation - overview, methodology, systems, results , 2005, INTERSPEECH.
[149] B. S. Manjunath,et al. Multisensor Image Fusion Using the Wavelet Transform , 1995, CVGIP Graph. Model. Image Process..
[150] Luc De Raedt,et al. Top-Down Induction of Clustering Trees , 1998, ICML.
[151] Charles L. A. Clarke,et al. Overview of the TREC 2004 Terabyte Track , 2004, TREC.
[152] Alan F. Smeaton,et al. Large Scale Evaluations of Multimedia Information Retrieval: The TRECVid Experience , 2005, CIVR.
[153] Christopher Nw Agboso. User focused Surveillance Systems Integration for Intelligent Transport Systems , 1999 .
[154] Alan M. McIvor,et al. Background Subtraction Techniques , 2000 .
[155] Peter Radford,et al. Petri Net Theory and the Modeling of Systems , 1982 .
[156] Bir Bhanu,et al. Guest editorial: Special issue on computer vision beyond the visible spectrum , 2003, Image Vis. Comput..
[157] Noel E. O'Connor,et al. Comparison of Fusion Methods for Thermo-Visual Surveillance Tracking , 2006, 2006 9th International Conference on Information Fusion.
[158] Carlo S. Regazzoni,et al. Introduction to the special issue on video object processing for surveillance applications , 2005, Real Time Imaging.
[159] GoslingJames. Java intermediate bytecodes , 1995 .
[160] Enrico Motta,et al. Using the Semantic Web as Background Knowledge for Ontology Mapping , 2006, Ontology Matching.
[161] Tobias Nipkow,et al. Bytecode Analysis for Proof Carrying Code , 2005, Bytecode@ETAPS.
[162] Michael Franz,et al. The source is the proof , 2002, NSPW '02.
[163] Mark J. F. Gales,et al. The Cambridge University March 2005 speaker diarisation system , 2005, INTERSPEECH.
[164] Shraga Shoval,et al. Computerized obstacle avoidance systems for the blind and visually impaired , 2001 .
[165] Christopher A. Vick,et al. The Java HotSpotTM Server Compiler , 2001 .
[166] Jørgen Bundgaard. An ANDF based Ada 95 compiler system , 1995, TRI-Ada '95.
[167] David A. Whitney,et al. AUTOALERT: AUTOMATED ACOUSTIC DETECTION OF INCIDENTS , 1995 .
[168] Feng Chu,et al. Deadlock analysis of Petri nets using siphons and mathematical programming , 1997, IEEE Trans. Robotics Autom..
[169] Andrei Broder,et al. A taxonomy of web search , 2002, SIGF.
[170] Cyril Cleverdon,et al. The Cranfield tests on index language devices , 1997 .
[171] James W. Davis,et al. Real-time recognition of activity using temporal templates , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.
[172] Mark N. Wegman,et al. Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.
[173] George C. Necula,et al. Oracle-based checking of untrusted software , 2001, POPL '01.
[174] Thomas Martin Deserno,et al. The CLEF 2005 Cross-Language Image Retrieval Track , 2003, CLEF.
[175] Hendrik Blockeel,et al. Top-Down Induction of First Order Logical Decision Trees , 1998, AI Commun..
[176] Dan Grossman,et al. TALx86: A Realistic Typed Assembly Language∗ , 1999 .
[177] H.J. Huang,et al. Property-preserving composition of augmented marked graphs that share common resources , 2003, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422).
[178] Ryszard S. Michalski,et al. On the Quasi-Minimal Solution of the General Covering Problem , 1969 .
[179] W. Eric L. Grimson,et al. Adaptive background mixture models for real-time tracking , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[180] Michael Franz,et al. A portable Virtual Machine target for Proof-Carrying Code , 2003, IVME '03.
[181] James Gosling,et al. Java Intermediate Bytecode , 1995, Intermediate Representations Workshop.
[182] Michael Steffen Oliver Franz,et al. Code_generation On_the_fly: a Key to Portable Software , 1994 .
[183] Jean-Marc Odobez,et al. Audio-visual speaker tracking with importance particle filters , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[184] James W. Davis,et al. The Recognition of Human Movement Using Temporal Templates , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[185] Carol Peters,et al. CLEF 2006: Ad Hoc Track Overview , 2006, CLEF.
[186] Andrew W. Appel,et al. Foundational proof-carrying code , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.
[187] R. Oka,et al. Recognition of dexterous manipulations from time-varying images , 1994, Proceedings of 1994 IEEE Workshop on Motion of Non-rigid and Articulated Objects.
[188] Michal Irani,et al. Detecting Irregularities in Images and in Video , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[189] Stephen J. Maybank,et al. Visual Surveillance for Moving Vehicles , 1998, International Journal of Computer Vision.
[190] P. Smets,et al. Assessing sensor reliability for multisensor data fusion within the transferable belief model , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[191] Wolfgang Reisig,et al. Lectures on Petri Nets I: Basic Models , 1996, Lecture Notes in Computer Science.
[192] Michael Franz. Emulating an operating system on top of another , 1993, Softw. Pract. Exp..
[193] Samy Bengio,et al. Semi-supervised adapted HMMs for unusual event detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[194] Alexander H. Waibel,et al. Towards Unrestricted Lip Reading , 2000, Int. J. Pattern Recognit. Artif. Intell..
[195] Hermann Ney,et al. Large vocabulary continuous speech recognition of Broadcast News - The Philips/RWTH approach , 2002, Speech Commun..
[196] D A Reynolds,et al. The MIT Lincoln Laboratory RT-04F Diarization Systems: Applications to Broadcast Audio and Telephone Conversations , 2004 .
[197] George C. Necula,et al. Efficient Representation and Validation of Logical Proofs , 1997, LICS 1997.
[198] Michael Franz. Open Standards Beyond Java: On the Future of Mobile Code for the Internet , 1998, J. Univers. Comput. Sci..
[199] Douglas B. Lenat,et al. CYC: a large-scale investment in knowledge infrastructure , 1995, CACM.
[200] Daben Liu,et al. Speech and language technologies for audio indexing and retrieval , 2000, Proceedings of the IEEE.
[201] Franco Gasperoni,et al. Multilanguage programming on the JVM: the Ada 95 benefits , 2000, ALET.
[202] M. de Rijke,et al. Overview of the CLEF 2005 Multilingual Question Answering Track , 2005, CLEF.
[203] Wolfgang Reisig. Petri Nets: An Introduction , 1985, EATCS Monographs on Theoretical Computer Science.
[204] James Gosling. The Java Language Specification - Second Edition , 2000 .
[205] Igor Kononenko,et al. Estimation of Regressor Reliability , 2008 .
[206] Philip C. Woodland,et al. The development of the HTK Broadcast News transcription system: An overview , 2002, Speech Commun..
[207] Damian M. Lyons,et al. Visual Surveillance in Retail Stores and in the Home , 2002 .
[208] J. Movellan. Tutorial on Hidden Markov Models , 2006 .
[209] Dawson R. Engler,et al. VCODE: a retargetable, extensible, very fast dynamic code generation system , 1996, PLDI '96.
[210] Bernard Ženko,et al. Learning Predictive Clustering Rules , 2005, Informatica.
[211] Matthew Q. Beers,et al. Making mobile code both safe and efficient , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[212] Jean-Luc Gauvain,et al. The LIMSI Broadcast News transcription system , 2002, Speech Commun..
[213] Alex Pentland,et al. Pfinder: Real-Time Tracking of the Human Body , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[214] Renate Sitte,et al. Comparison of techniques for environmental sound recognition , 2003, Pattern Recognit. Lett..
[215] Cliff Click,et al. The java hotspot TM server compiler , 2001 .
[216] Barbara Peskin,et al. TOWARDS ROBUST SPEAKER SEGMENTATION: THE ICSI-SRI FALL 2004 DIARIZATION SYSTEM , 2004 .
[217] Jörg Desel,et al. Free choice Petri nets , 1995 .
[218] Tieniu Tan,et al. A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[219] Alan F. Smeaton,et al. Fusion of infrared and visible spectrum video for indoor surveillance , 2005 .