Intermediate Representations of Mobile Code

Over the past decade, since Java was first introduced and integrated into the Netscape web browser, several intermediate representations have been developed that might be potentially used for mobile code applications. This paper examines the requirements for a mobile code representation, presents several examples of stack-based, tree-oriented, and proof-annotating mobile code representations, and evaluates each of these representations according to the requirements.

[1]  MengChu Zhou,et al.  Modeling, Simulation, and Control of Flexible Manufacturing Systems - A Petri Net Approach , 1999, Series in Intelligent Control and Intelligent Automation.

[2]  Furio Honsell,et al.  A framework for defining logics , 1993, JACM.

[3]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[4]  Mark Sanderson,et al.  Information retrieval system evaluation: effort, sensitivity, and reliability , 2005, SIGIR '05.

[5]  Falk Scholer,et al.  User performance versus precision measures for simple search tasks , 2006, SIGIR.

[6]  Richard M. Schwartz,et al.  A compact model for speaker-adaptive training , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.

[7]  MuDer Jeng,et al.  Process nets with resources for manufacturing modeling and their analysis , 2002, IEEE Trans. Robotics Autom..

[8]  Neil J. Gordon,et al.  A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking , 2002, IEEE Trans. Signal Process..

[9]  King Sing Cheung,et al.  A Synthesis Approach to Deriving Object-Based Specifications from Object Interaction Scenarios , 2006 .

[10]  France Mihelic,et al.  Development of Slovenian Broadcast News Speech Database , 2004, LREC.

[11]  Tiziana D'Orazio,et al.  Human Activity Recognition in Archaeological Sites by Hidden Markov Models , 2004, PCM.

[12]  Luke Fletcher,et al.  An adaptive fusion architecture for target tracking , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.

[13]  Ravindra B. Keskar,et al.  Compiling Safe Mobile Code , 2002, The Compiler Design Handbook.

[14]  Lawrence B. Wolff,et al.  Tracking human faces in infrared video , 2003, Image Vis. Comput..

[15]  John H. L. Hansen,et al.  Unsupervised audio stream segmentation and clustering via the Bayesian information criterion , 2000, INTERSPEECH.

[16]  Trevor Darrell,et al.  Multiple person and speaker activity tracking with a particle filter , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[17]  David Hawking,et al.  Overview of the TREC 2003 Web Track , 2003, TREC.

[18]  Jean-Luc Gauvain,et al.  Multistage speaker diarization of broadcast news , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[19]  Shih-Schon Lin Review: Extending Visible Band Computer Vision Techniques to Infrared Band Images , 2001 .

[20]  Clemente Ibarra-Castanedo,et al.  Advanced surveillance systems: combining video and thermal imagery for pedestrian detection , 2004, SPIE Defense + Commercial Sensing.

[21]  Guillaume Gravier,et al.  Experiments on speaker tracking and segmentation in radio broadcast news , 2005, INTERSPEECH.

[22]  David Gregg,et al.  The case for virtual register machines , 2003, IVME '03.

[23]  Sharath Pankanti,et al.  Appearance models for occlusion handling , 2006, Image Vis. Comput..

[24]  George C. Necula,et al.  The design and implementation of a certifying compiler , 1998, PLDI.

[25]  Jeffery von Ronne,et al.  An Inherently Type-Safe SSA-based Code Format , 2006 .

[26]  Harriet J. Nock,et al.  Assessing face and speech consistency for monologue detection in video , 2002, MULTIMEDIA '02.

[27]  Richard M. Schwartz,et al.  Practical Implementations of Speaker-Adaptive Training , 1997 .

[28]  Galina L. Rogova,et al.  Reliability In Information Fusion : Literature Survey , 2004 .

[29]  M. de Rijke,et al.  Overview of WebCLEF 2005 , 2005, CLEF.

[30]  Ankush Mittal An Overview of Multimedia Content-Based Retrieval Strategies , 2006, Informatica.

[31]  Egon Börger,et al.  Java and the Java Virtual Machine: Definition, Verification, Validation , 2001 .

[32]  Dan Istrate,et al.  Broadcast news speaker tracking for ESTER 2005 campaign , 2005, INTERSPEECH.

[33]  Nebojsa Jojic,et al.  Audio-visual graphical models for speech processing , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[34]  Takeo Kanade,et al.  A System for Video Surveillance and Monitoring , 2000 .

[35]  Albert J. Ahumada,et al.  Sensor fusion for synthetic vision , 1991 .

[36]  Karsten Sohr Die Sicherheitsaspekte von mobilem Code , 2001 .

[37]  Andy Nisbet,et al.  The case for virtual register machines , 2005, Sci. Comput. Program..

[38]  France Mihelic,et al.  Speech/Non-Speech Segmentation Based on Phoneme Recognition Features , 2006, EURASIP J. Adv. Signal Process..

[39]  Frank Yellin,et al.  The Java Virtual Machine Specification , 1996 .

[40]  J. L. Roux An Introduction to the Kalman Filter , 2003 .

[41]  Fredric C. Gey,et al.  GeoCLEF 2008: the CLEF 2008 Cross-Language Geographic Information Retrieval Track Overview , 2008, CLEF.

[42]  Bertil Folliot,et al.  Beyond Flexibility and Reflection: The Virtual Virtual Machine Approach , 2001, IWCC.

[43]  Andrew David Marshall,et al.  A data fusion system for object recognition based on transferable belief models and kalman filters , 2004 .

[44]  Yuan-Fang Wang,et al.  Real-time multiperson tracking in video surveillance , 2003, Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint.

[45]  P. J. Escamilla-Ambrosio,et al.  A hybrid Kalman filter-fuzzy logic architecture for multisensor data fusion , 2001, Proceeding of the 2001 IEEE International Symposium on Intelligent Control (ISIC '01) (Cat. No.01CH37206).

[46]  Carlo S. Regazzoni,et al.  Content-based retrieval and real time detection from video sequences acquired by surveillance systems , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[47]  ScienceYale UniversityNew Haven An Overview of the Flint/ml Compiler , 1997 .

[48]  Christian Fabre,et al.  Verification of ANDF components , 1995, IR '95.

[49]  Robert W. Floyd,et al.  Assigning Meanings to Programs , 1993 .

[50]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[51]  Ramesh A. Gopinath,et al.  Improved speaker segmentation and segments clustering using the bayesian information criterion , 1999, EUROSPEECH.

[52]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[53]  Nipun Kwatra,et al.  A Framework for Activity Recognition and Detection of Unusual Activities , 2004, ICVGIP.

[54]  Dan Grossman,et al.  Scalable Certification of Native Code: Experience from Compiling to TALx86 , 2000 .

[55]  Terry A. Welch,et al.  A Technique for High-Performance Data Compression , 1984, Computer.

[56]  Pat Langley,et al.  Elements of Machine Learning , 1995 .

[57]  Michael J. Brooks,et al.  Issues in Automated Visual Surveillance , 2003, DICTA.

[58]  Douglas A. Reynolds,et al.  The NIST speaker recognition evaluation - Overview, methodology, systems, results, perspective , 2000, Speech Commun..

[59]  Dan Grossman,et al.  Syntactic type abstraction , 2000, TOPL.

[60]  Tommy Thorne,et al.  Programming languages for mobile code , 1997, CSUR.

[61]  Jean-François Bonastre,et al.  Evolutive HMM for multi-speaker tracking system , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[62]  R. Cucchiara Multimedia surveillance systems , 2005, VSSN@MM.

[63]  Christian Wellekens,et al.  A speaker tracking system based on speaker turn detection for NIST evaluation , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[64]  Mohan S. Kankanhalli,et al.  Information assimilation framework for event detection in multimedia surveillance systems , 2006, Multimedia Systems.

[65]  Jeffery von Ronne,et al.  Code Annotation for Safe and Efficient Dynamic Object Resolution , 2003, Electron. Notes Theor. Comput. Sci..

[66]  Robert Wahbe,et al.  Efficient and language-independent mobile programs , 1996, PLDI '96.

[67]  George C. Necula,et al.  Compiling with proofs , 1998 .

[68]  King Sing Cheung,et al.  New characterization for live and reversible augmented marked graphs , 2004, Inf. Process. Lett..

[69]  Jeffery von Ronne,et al.  SSA-based mobile code: Implementation and empirical evaluation , 2007, TACO.

[70]  James Mayfield,et al.  Character N-Gram Tokenization for European Language Text Retrieval , 2004, Information Retrieval.

[71]  Howard D. Wactlar,et al.  Combining motion segmentation with tracking for activity analysis , 2004, Sixth IEEE International Conference on Automatic Face and Gesture Recognition, 2004. Proceedings..

[72]  Carol Peters,et al.  CLEF 2007: Ad Hoc Track Overview , 2008, CLEF.

[73]  T. Y. Cheung,et al.  A petri-net-based synthesis methodology for use-case-driven system design , 2006, J. Syst. Softw..

[74]  Dean A. Scribner,et al.  Image fusion for tactical applications , 1998, Optics & Photonics.

[75]  B. Ripley,et al.  Pattern Recognition , 1968, Nature.

[76]  Ellen M. Voorhees,et al.  The TREC robust retrieval track , 2005, SIGF.

[77]  James W. Davis,et al.  Robust detection of people in thermal imagery , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[78]  Roland Auckenthaler,et al.  Score Normalization for Text-Independent Speaker Verification Systems , 2000, Digit. Signal Process..

[79]  Dan Grossman,et al.  Scalable Certification for Typed Assembly Language , 2000, Types in Compilation.

[80]  James E. Black,et al.  A novel method for video tracking performance evaluation , 2003 .

[81]  M. de Rijke,et al.  Blueprint of a Cross-Lingual Web Retrieval Collection , 2005, J. Digit. Inf. Manag..

[82]  Chin-Hui Lee,et al.  Maximum a posteriori estimation for multivariate Gaussian mixture observations of Markov chains , 1994, IEEE Trans. Speech Audio Process..

[83]  Masahiko Yachida,et al.  Multiple-view-based tracking of multiple humans , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[84]  Kentaro Toyama,et al.  Wallflower: principles and practice of background maintenance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[85]  K. John Gough Stacking them up: a comparison of virtual machines , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.

[86]  Iwan Ulrich,et al.  The GuideCane-applying mobile robot technologies to assist the visually impaired , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[87]  D-IOOO Berlin,et al.  TWO AXIOMS FOR EVALUATION MEASURES IN INFORMATION RETRIEVAL , 2001 .

[88]  W. Amme,et al.  Improving the Java Virtual Machine Using Type-Separated Bytecode , 2006 .

[89]  George C. Necula,et al.  A Proof-Carrying Code Architecture for Java , 2000, CAV.

[90]  Janez Zibert,et al.  Novel Approaches to Speech Detection in the Processing of Continuous Audio Streams , 2007 .

[91]  S. Chen,et al.  Speaker, Environment and Channel Change Detection and Clustering via the Bayesian Information Criterion , 1998 .

[92]  Peter Clark,et al.  The CN2 Induction Algorithm , 1989, Machine Learning.

[93]  Peter Clark,et al.  Rule Induction with CN2: Some Recent Improvements , 1991, EWSL.

[94]  Vladimir Pavlovic,et al.  Visual Interpretation of Hand Gestures for Human-Computer Interaction: A Review , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[95]  Jean-Luc Gauvain,et al.  Partitioning and transcription of broadcast news data , 1998, ICSLP.

[96]  Jim des Rivières,et al.  Eclipse: A platform for integrating development tools , 2004, IBM Syst. J..

[97]  Kathleen Jensen,et al.  Pascal-P Implementation Notes , 1981, Pascal - The Language and its Implementation.

[98]  Nada Lavrac,et al.  Expert-Guided Subgroup Discovery: Methodology and Application , 2011, J. Artif. Intell. Res..

[99]  Atsushi Nakazawa,et al.  Human tracking using distributed vision systems , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).

[100]  Gérard Chollet,et al.  The Elisa'99 Speaker Recognition and Tracking Systems , 1999 .

[101]  Matthew Arnold,et al.  Adaptive optimization in the Jalapeño JVM , 2000, OOPSLA '00.

[102]  Jeffery von Ronne,et al.  SafeTSA: a type safe and referentially secure mobile-code representation based on static single assignment form , 2001, PLDI '01.

[103]  Rama Chellappa,et al.  Human and machine recognition of faces: a survey , 1995, Proc. IEEE.

[104]  George C. Necula,et al.  A certifying compiler for Java , 2000, PLDI '00.

[105]  Zhigang Zhu,et al.  Integrating LDV Audio and IR Video for Remote Multimodal Surveillance , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[106]  Michael Franz The Java Virtual Machine: A Passing Fad? , 1998, IEEE Softw..

[107]  Alberto Broggi,et al.  Pedestrian detection in infrared images , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).

[108]  Rita Cucchiara,et al.  Using computer vision techniques for dangerous situation detection in domotic applications , 2004 .

[109]  Jean-Luc Gauvain,et al.  Combining speaker identification and BIC for speaker diarization , 2005, INTERSPEECH.

[110]  France Mihelic,et al.  Robust Speech Detection Based on Phoneme Recognition Features , 2006, TSD.

[111]  A. Mittal,et al.  A Multimodal Audio Visible and Infrared Surveillance System (MAVISS) , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[112]  Sameer Singh,et al.  Video analysis of human dynamics - a survey , 2003, Real Time Imaging.

[113]  Philippe Smets,et al.  Data association in multi‐target detection using the transferable belief model , 2001, Int. J. Intell. Syst..

[114]  Sridha Sridharan,et al.  Feature warping for robust speaker verification , 2001, Odyssey.

[115]  Sergio A. Velastin,et al.  Intelligent distributed surveillance systems: a review , 2005 .

[116]  Zoran Bosnic Estimation of Individual Prediction Reliability Using Sensitivity Analysis of Regression Models , 2008, Informatica.

[117]  Giorgio Maria Di Nunzio,et al.  How robust are multilingual information retrieval systems? , 2008, SAC '08.

[118]  Joel H. Blatt,et al.  Undersea object detection and recognition: the use of spatially and temporally varying coherent illumination , 1999, Oceans '99. MTS/IEEE. Riding the Crest into the 21st Century. Conference and Exhibition. Conference Proceedings (IEEE Cat. No.99CH37008).

[119]  Xia Liu,et al.  Pedestrian detection and tracking with night vision , 2005, IEEE Transactions on Intelligent Transportation Systems.

[120]  André Elisseeff,et al.  Stability and Generalization , 2002, J. Mach. Learn. Res..

[121]  King Sing Cheung,et al.  Cycle inclusion property of augmented marked graphs , 2005, Inf. Process. Lett..

[122]  Michael Franz,et al.  Slim binaries , 1997, CACM.

[123]  Jun Li SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES , 2010 .

[124]  Min Chen,et al.  Semantic event detection via multimodal data mining , 2006, IEEE Signal Processing Magazine.

[125]  Ali S. Hadi,et al.  Finding Groups in Data: An Introduction to Chster Analysis , 1991 .

[126]  Pramod K. Varshney,et al.  Sensor Fusion for Video Surveillance , 2004 .

[127]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[128]  MuDer Jeng,et al.  Manufacturing modeling using process nets with resources , 2000, Proceedings 2000 ICRA. Millennium Conference. IEEE International Conference on Robotics and Automation. Symposia Proceedings (Cat. No.00CH37065).

[129]  Douglas A. Reynolds,et al.  An overview of automatic speaker diarization systems , 2006, IEEE Transactions on Audio, Speech, and Language Processing.

[130]  Alexander Gammerman,et al.  Transduction with Confidence and Credibility , 1999, IJCAI.

[131]  Guy L. Steele,et al.  Java Language Specification, Second Edition: The Java Series , 2000 .

[132]  George C. Necula,et al.  Research on proof-carrying code for untrusted-code security , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[133]  Michael Franz,et al.  Continuous program optimization , 1999 .

[134]  James W. Davis,et al.  Fusion-Based Background-Subtraction using Contour Saliency , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[135]  Kamel Barkaoui,et al.  On Liveness in Extended non Self-Controlling Nets , 1995, Application and Theory of Petri Nets.

[136]  Thomas Mandl,et al.  The effect of named entities on effectiveness in cross-language information retrieval evaluation , 2005, SAC '05.

[137]  John Gough,et al.  Technical Overview of the Common Language Runtime , 2001 .

[138]  Alan F. Smeaton,et al.  Multispectral Object Segmentation and Retrieval in Surveillance Video , 2006, 2006 International Conference on Image Processing.

[139]  Trevor Darrell,et al.  Nearest-Neighbor Methods in Learning and Vision , 2008, IEEE Trans. Neural Networks.

[140]  David J. Fleet,et al.  Performance of optical flow techniques , 1994, International Journal of Computer Vision.

[141]  Ankush Mittal,et al.  Fusion of Thermal Infrared and Visible Spectrum Video for Robust Surveillance , 2006, ICVGIP.

[142]  David Gregg,et al.  Virtual machine showdown: stack versus registers , 2005, VEE '05.

[143]  David L. Dill,et al.  Faster Proof Checking in the Edinburgh Logical Framework , 2002, CADE.

[144]  Steve Young,et al.  Segment generation and clustering in the HTK broadcast news transcription system , 1998 .

[145]  Igor Kononenko,et al.  Estimation of individual prediction reliability using the local sensitivity analysis , 2008, Applied Intelligence.

[146]  Jürg Kohlas,et al.  Handbook of Defeasible Reasoning and Uncertainty Management Systems , 2000 .

[147]  Michael Franz,et al.  A Tree-Based Alternative to Java Byte-Codes , 1999, International Journal of Parallel Programming.

[148]  João Paulo da Silva Neto,et al.  The COST278 broadcast news segmentation and speaker clustering evaluation - overview, methodology, systems, results , 2005, INTERSPEECH.

[149]  B. S. Manjunath,et al.  Multisensor Image Fusion Using the Wavelet Transform , 1995, CVGIP Graph. Model. Image Process..

[150]  Luc De Raedt,et al.  Top-Down Induction of Clustering Trees , 1998, ICML.

[151]  Charles L. A. Clarke,et al.  Overview of the TREC 2004 Terabyte Track , 2004, TREC.

[152]  Alan F. Smeaton,et al.  Large Scale Evaluations of Multimedia Information Retrieval: The TRECVid Experience , 2005, CIVR.

[153]  Christopher Nw Agboso User focused Surveillance Systems Integration for Intelligent Transport Systems , 1999 .

[154]  Alan M. McIvor,et al.  Background Subtraction Techniques , 2000 .

[155]  Peter Radford,et al.  Petri Net Theory and the Modeling of Systems , 1982 .

[156]  Bir Bhanu,et al.  Guest editorial: Special issue on computer vision beyond the visible spectrum , 2003, Image Vis. Comput..

[157]  Noel E. O'Connor,et al.  Comparison of Fusion Methods for Thermo-Visual Surveillance Tracking , 2006, 2006 9th International Conference on Information Fusion.

[158]  Carlo S. Regazzoni,et al.  Introduction to the special issue on video object processing for surveillance applications , 2005, Real Time Imaging.

[159]  GoslingJames Java intermediate bytecodes , 1995 .

[160]  Enrico Motta,et al.  Using the Semantic Web as Background Knowledge for Ontology Mapping , 2006, Ontology Matching.

[161]  Tobias Nipkow,et al.  Bytecode Analysis for Proof Carrying Code , 2005, Bytecode@ETAPS.

[162]  Michael Franz,et al.  The source is the proof , 2002, NSPW '02.

[163]  Mark J. F. Gales,et al.  The Cambridge University March 2005 speaker diarisation system , 2005, INTERSPEECH.

[164]  Shraga Shoval,et al.  Computerized obstacle avoidance systems for the blind and visually impaired , 2001 .

[165]  Christopher A. Vick,et al.  The Java HotSpotTM Server Compiler , 2001 .

[166]  Jørgen Bundgaard An ANDF based Ada 95 compiler system , 1995, TRI-Ada '95.

[167]  David A. Whitney,et al.  AUTOALERT: AUTOMATED ACOUSTIC DETECTION OF INCIDENTS , 1995 .

[168]  Feng Chu,et al.  Deadlock analysis of Petri nets using siphons and mathematical programming , 1997, IEEE Trans. Robotics Autom..

[169]  Andrei Broder,et al.  A taxonomy of web search , 2002, SIGF.

[170]  Cyril Cleverdon,et al.  The Cranfield tests on index language devices , 1997 .

[171]  James W. Davis,et al.  Real-time recognition of activity using temporal templates , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.

[172]  Mark N. Wegman,et al.  Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.

[173]  George C. Necula,et al.  Oracle-based checking of untrusted software , 2001, POPL '01.

[174]  Thomas Martin Deserno,et al.  The CLEF 2005 Cross-Language Image Retrieval Track , 2003, CLEF.

[175]  Hendrik Blockeel,et al.  Top-Down Induction of First Order Logical Decision Trees , 1998, AI Commun..

[176]  Dan Grossman,et al.  TALx86: A Realistic Typed Assembly Language∗ , 1999 .

[177]  H.J. Huang,et al.  Property-preserving composition of augmented marked graphs that share common resources , 2003, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422).

[178]  Ryszard S. Michalski,et al.  On the Quasi-Minimal Solution of the General Covering Problem , 1969 .

[179]  W. Eric L. Grimson,et al.  Adaptive background mixture models for real-time tracking , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).

[180]  Michael Franz,et al.  A portable Virtual Machine target for Proof-Carrying Code , 2003, IVME '03.

[181]  James Gosling,et al.  Java Intermediate Bytecode , 1995, Intermediate Representations Workshop.

[182]  Michael Steffen Oliver Franz,et al.  Code_generation On_the_fly: a Key to Portable Software , 1994 .

[183]  Jean-Marc Odobez,et al.  Audio-visual speaker tracking with importance particle filters , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[184]  James W. Davis,et al.  The Recognition of Human Movement Using Temporal Templates , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[185]  Carol Peters,et al.  CLEF 2006: Ad Hoc Track Overview , 2006, CLEF.

[186]  Andrew W. Appel,et al.  Foundational proof-carrying code , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.

[187]  R. Oka,et al.  Recognition of dexterous manipulations from time-varying images , 1994, Proceedings of 1994 IEEE Workshop on Motion of Non-rigid and Articulated Objects.

[188]  Michal Irani,et al.  Detecting Irregularities in Images and in Video , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[189]  Stephen J. Maybank,et al.  Visual Surveillance for Moving Vehicles , 1998, International Journal of Computer Vision.

[190]  P. Smets,et al.  Assessing sensor reliability for multisensor data fusion within the transferable belief model , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[191]  Wolfgang Reisig,et al.  Lectures on Petri Nets I: Basic Models , 1996, Lecture Notes in Computer Science.

[192]  Michael Franz Emulating an operating system on top of another , 1993, Softw. Pract. Exp..

[193]  Samy Bengio,et al.  Semi-supervised adapted HMMs for unusual event detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[194]  Alexander H. Waibel,et al.  Towards Unrestricted Lip Reading , 2000, Int. J. Pattern Recognit. Artif. Intell..

[195]  Hermann Ney,et al.  Large vocabulary continuous speech recognition of Broadcast News - The Philips/RWTH approach , 2002, Speech Commun..

[196]  D A Reynolds,et al.  The MIT Lincoln Laboratory RT-04F Diarization Systems: Applications to Broadcast Audio and Telephone Conversations , 2004 .

[197]  George C. Necula,et al.  Efficient Representation and Validation of Logical Proofs , 1997, LICS 1997.

[198]  Michael Franz Open Standards Beyond Java: On the Future of Mobile Code for the Internet , 1998, J. Univers. Comput. Sci..

[199]  Douglas B. Lenat,et al.  CYC: a large-scale investment in knowledge infrastructure , 1995, CACM.

[200]  Daben Liu,et al.  Speech and language technologies for audio indexing and retrieval , 2000, Proceedings of the IEEE.

[201]  Franco Gasperoni,et al.  Multilanguage programming on the JVM: the Ada 95 benefits , 2000, ALET.

[202]  M. de Rijke,et al.  Overview of the CLEF 2005 Multilingual Question Answering Track , 2005, CLEF.

[203]  Wolfgang Reisig Petri Nets: An Introduction , 1985, EATCS Monographs on Theoretical Computer Science.

[204]  James Gosling The Java Language Specification - Second Edition , 2000 .

[205]  Igor Kononenko,et al.  Estimation of Regressor Reliability , 2008 .

[206]  Philip C. Woodland,et al.  The development of the HTK Broadcast News transcription system: An overview , 2002, Speech Commun..

[207]  Damian M. Lyons,et al.  Visual Surveillance in Retail Stores and in the Home , 2002 .

[208]  J. Movellan Tutorial on Hidden Markov Models , 2006 .

[209]  Dawson R. Engler,et al.  VCODE: a retargetable, extensible, very fast dynamic code generation system , 1996, PLDI '96.

[210]  Bernard Ženko,et al.  Learning Predictive Clustering Rules , 2005, Informatica.

[211]  Matthew Q. Beers,et al.  Making mobile code both safe and efficient , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[212]  Jean-Luc Gauvain,et al.  The LIMSI Broadcast News transcription system , 2002, Speech Commun..

[213]  Alex Pentland,et al.  Pfinder: Real-Time Tracking of the Human Body , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[214]  Renate Sitte,et al.  Comparison of techniques for environmental sound recognition , 2003, Pattern Recognit. Lett..

[215]  Cliff Click,et al.  The java hotspot TM server compiler , 2001 .

[216]  Barbara Peskin,et al.  TOWARDS ROBUST SPEAKER SEGMENTATION: THE ICSI-SRI FALL 2004 DIARIZATION SYSTEM , 2004 .

[217]  Jörg Desel,et al.  Free choice Petri nets , 1995 .

[218]  Tieniu Tan,et al.  A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[219]  Alan F. Smeaton,et al.  Fusion of infrared and visible spectrum video for indoor surveillance , 2005 .