• Aucun résultat trouvé

End-to-end approach

An end to end approach to the resequencing problem

An end to end approach to the resequencing problem

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

29

BeatDB : an end-to-end approach to unveil saliencies from massive signal data sets

BeatDB : an end-to-end approach to unveil saliencies from massive signal data sets

... lead to a more accurate prediction? (Section 5.4.3 ) To find the best scale and time shift with different lag and lead, we perform a grid search for each wavelet transform ...process to explore the ...

153

End-to-end named entity and semantic concept extraction from speech

End-to-end named entity and semantic concept extraction from speech

... such approach is that it cannot allow to detect named entity that were not injected in the ASR ...neural end-to-end approach to extract named entities from ...expect ...

9

End-2-end End-2-end evaluation of IP multimedia services, a user-perceived QoS approach

End-2-end End-2-end evaluation of IP multimedia services, a user-perceived QoS approach

... closer to the beginning, see [ 1 ]). It is important to recall that PESQ is the actual ITU recommendation for voice perceived quality assessment [ 17 ...close to the obtained with PESQ, something ...

11

Confidence measure for speech-to-concept end-to-end spoken language understanding

Confidence measure for speech-to-concept end-to-end spoken language understanding

... system to learn an alignment between an audio input and a character sequence to ...sequence to be produced by the neural ...Our end-to-end SLU system is trained following the ...

6

Decentralized Prediction of End-to-End Network Performance Classes

Decentralized Prediction of End-to-End Network Performance Classes

... approaches to matrix completion have been proposed, few of them are designed for network applications where decentralized processing of data is ...decentralized approach based on Stochastic Gra- dient ...

12

End-to-End Adaptive Framework for Multimedia Information Retrieval

End-to-End Adaptive Framework for Multimedia Information Retrieval

... semantic approach to existing web resources is one of the major challenges for building the semantic ...due to lack of use of metadata information generated by annotations and ontology models that ...

11

A Non-intrusive Tool Chain to Optimize MPSoC End-to-end Systems

A Non-intrusive Tool Chain to Optimize MPSoC End-to-end Systems

... adjusted to the hardware design. This char- acteristic is essential to maintain a fast emulation over a long period of ...possibility to log all signals from the emulated design in a hardware ...

23

Towards End-to-End QoS in Ad Hoc Networks

Towards End-to-End QoS in Ad Hoc Networks

... proportional approach outperforms the strict prioritization scheme, where higher priority classes are serviced before lower ...desirable to distribute the bandwidth degradation across different classes in a ...

10

Delay Tolerant Users: A solution to end-to-end network energy efficiency

Delay Tolerant Users: A solution to end-to-end network energy efficiency

... active to maintain coverage, and flexible cells, which can be deactivated when required [BGR + ...coverage to increase the capacity of the ...candidate to be deactivated in periods of low ...

181

End-to-End Kernel Learning with Supervised Convolutional Kernel Networks

End-to-End Kernel Learning with Supervised Convolutional Kernel Networks

... known to better reflect the quality perceived by humans than the PSNR; it is commonly used to evaluate the quality of super-resolution methods, see [8, 26, ...our approach recovers better thin ...

17

Towards End-to-End spoken intent recognition in smart home

Towards End-to-End spoken intent recognition in smart home

... able to supersede the baseline pipeline approach for intent ...E2E approach made better use of a reduced amount of data than the pipeline word- based approach for which more data is ...SLU ...

10

Response Selection for End-to-End Retrieval-Based Dialogue Systems

Response Selection for End-to-End Retrieval-Based Dialogue Systems

... its approach and identified some drawbacks that we addressed through a new ...encoder to encode both the whole context and the candidate response and project them into the same space in contrast to ...

130

CoMe4ACloud: An End-to-End Framework for Autonomic Cloud Systems

CoMe4ACloud: An End-to-End Framework for Autonomic Cloud Systems

... interesting to follow this 820 work in the ...metamodels to describe resour- ces, applications, adaptation policies, ...proposed to fulfill some requirements for quality-of-service and resource ma- ...

31

End-to-End 6DoF Pose Estimation From Monocular RGB Images

End-to-End 6DoF Pose Estimation From Monocular RGB Images

... End-to-end 6DoF Pose Estimation from Monocular RGB Images Wenbin Zou, Di Wu, Shishun Tian, Canqun Xiang, Xia Li and Lu Zhang Abstract—We present a conceptually simple framework for 6DoF object pose ...

12

Dealing with AADL end-to-end Flow Latency with UML Marte.

Dealing with AADL end-to-end Flow Latency with UML Marte.

... this approach by dealing with the same example as used in AADL [4] to explain the computation of end-to-end flow latencies (and various other related features) in a case of three ...

7

Architecting end-to-end convergence of Web and Telco services

Architecting end-to-end convergence of Web and Telco services

... our approach all the problems that may arise when orchestrating SIP-based and Web-based ...our approach is dependant on the Websocket standard which is known to have some security holes which are ...

9

End-to-End Probabilistic Ego-Vehicle Localization Framework

End-to-End Probabilistic Ego-Vehicle Localization Framework

... an end-to-end ego-localization framework is introduced with two main ...order to reduce the space complexity for the recognition ...leading to an ego-localization method that is, ...

14

CaSA : end-to-end quantitative security analysis of randomly mapped caches

CaSA : end-to-end quantitative security analysis of randomly mapped caches

... their approach cannot be used to analyze randomly mapped ...used to quantitatively measure side-channel leakage in processors by compute statistical correlation between transmitter and receiver’s ...

67

VNET: Towards End-to-End Network Cloudification

VNET: Towards End-to-End Network Cloudification

... belonging to different final users (mobile clients of the wireless network in our ...this approach, it can have specific QoS requirements and is a member of only one ...allocated to a tenant (virtual ...

6

Show all 10000 documents...

Sujets connexes