A METRIC FOR EVALUATING CONFIDENCE Sample Clauses

A METRIC FOR EVALUATING CONFIDENCE. This section gives the definition of our metric for evaluating con- fidence. In principle, the task of estimating confidence for each hypothesized word is to have an estimate of which words of the outputs of LVCSR models are likely to be correct and which are not reliable. In this paper, however, we focus on estimating cor- rectly recognized words and evaluate confidence according to re- call/precision rates of estimating correctly recognized words. The following gives a procedure for evaluating the agreement among the outputs of multiple LVCSR models as an estimate of correctly recognized words. First, let us suppose that we have two outputs Hyp1 and Hyp2 of two LVCSR models, each of which is represented as a sequence of hypothesized words. Next, two sequences Hyp1 and Hyp2 of hypothesized words are aligned by DP matching. Then, words that are aligned together and have an identical lexical form are collected into a list named agreed word list. Suppose that we have two sequences Hyp1 and Hyp2 of hypothesized words as below: Hyp1 = w11, ... , w1i,... , w1k
AutoNDA by SimpleDocs
A METRIC FOR EVALUATING CONFIDENCE. This section gives the definition of our metric for evaluating con- fidence. In principle, the task of estimating confidence for each hypothesized word is to have an estimate of which words of the outputs of LVCSR models are likely to be correct and which are not reliable. In this paper, however, we focus on estimating cor- rectly recognized words and evaluate confidence according to re- call/precision rates of estimating correctly recognized words. The following gives a procedure for evaluating the agreement among the outputs of multiple LVCSR models as an estimate of correctly recognized words. First, let us suppose that we have two outputs Hyp1 and Hyp2 of two LVCSR models, each of which is represented as a sequence of hypothesized words. Next, two sequences Hyp1 and Hyp2 of hypothesized words are aligned by DP matching. Then, words that are aligned together and have an identical lexical form are collected into a list named agreed word list. Suppose that we have two sequences Hyp1 and Hyp2 of hypothesized words as below: Hyp1 = w11, ... , w1i,... , w1k Hyp2 = w21, ... , w2j,... , w2l Then, the agreed word list is constructed by collecting those words w1i (= w2j ) that satisfy the constraint: w1i and w2j are aligned to- gether by DP matching, and w1i and w2j are lexically identical. Finally, the following recall/precision rates are calculated by com- paring the agreed word list with the reference sentence considering both the lexical form and the position of each word. # of correct words in the agreed word list Newspaper Article Sentences) speech data [8]. Recall = # of words in the reference sentence 1 When running the decoder with HMMs without the short pause state, we remove the powerless frames from the input speech, and use the lan- guage model trained without punctuation symbols (i.e., comma and pe- riod). 2 The reason why we evaluate acoustic models both with and without the short pause states is that, from the preliminary evaluation result, this difference proved to be among those most effective in achieving high con- fidence.

Related to A METRIC FOR EVALUATING CONFIDENCE

  • Exceptions to Confidential Information The obligations set forth in Section 13.1 (Confidential Information) shall not apply to the extent that Confidential Information includes information which is: (a) now or hereafter, through no unauthorized act or failure to act on the Receiving Party’s part, in the public domain; (b) was in the Receiving Party’s possession before receipt from the Disclosing Party and obtained from a source other than the Disclosing Party and other than through the prior relationship of the Disclosing Party and the Receiving Party before the Separation Date; (c) hereafter furnished to the Receiving Party by a third party as a matter of right and without restriction on disclosure; (d) furnished to others by the Disclosing Party without restriction on disclosure; or (e) independently developed by the Receiving Party without use of the Disclosing Party’s Confidential Information. Nothing in this Agreement shall prevent the Receiving Party from disclosing Confidential Information to the extent the Receiving Party is legally compelled to do so by any governmental, investigative or judicial agency pursuant to proceedings over which such agency has jurisdiction; provided, however, that prior to any such disclosure, the Receiving Party shall: (i) assert the confidential nature of the Confidential Information to the agency; (ii) immediately notify the Disclosing Party in writing of the agency’s order or request to disclose; and (iii) cooperate fully with the Disclosing Party in protecting against any such disclosure and/or obtaining a protective order narrowing the scope of the compelled disclosure and protecting its confidentiality.

  • Ownership of Confidential Information All Confidential Information shall be and shall remain the property of the party which supplied it to the other party.

  • Listing Information Confidentiality BellSouth will accord <<customer_name>>’s directory listing information the same level of confidentiality that BellSouth accords its own directory listing information, and BellSouth shall limit access to <<customer_name>>’s customer proprietary confidential directory information to those BellSouth employees or agents who are involved in the preparation of listings or directories.

  • E4 Confidential Information E4.1 Except to the extent set out in this clause or where disclosure is expressly permitted elsewhere in this Contract, each Party shall:

  • Title to Confidential Information a) Transnet will retain all right, title and interest in and to its Confidential Information and Background Intellectual Property and the Supplier/Service Provider acknowledges that it has no claim of any nature in and to the Confidential Information and Background Intellectual Property that is proprietary to Transnet. For the avoidance of doubt all the Supplier/Service Provider’s Background Intellectual Property shall remain vested in the Supplier/Service Provider.

  • Prime Confidential Information The following shall constitute Confidential Information of the Contractor and should not be disclosed to third (3rd) parties: the deliverables, discoveries, ideas, concepts, software [in various stages of development], designs, drawings, specifications, techniques, models, data, source code, source files, object code, documentation, diagrams, flow charts, research, development, processes, procedures, “know-how”, marketing techniques and materials, marketing and development plans, customer names and other information related to customers, price lists, pricing policies and financial information, this Agreement and the existence of this Agreement, the relationship between the Contractor and Subcontractor, and any details of the Service under this Agreement. Subcontractor agrees not to use or reference the Contractor and/or their names, likenesses, or logos (“Identity”). Subcontractor will not use or reference Contractor or their Identity, directly or indirectly, in conjunction with any other third (3rd) parties.

  • CITY OWNERSHIP OF PROPRIETARY INFORMATION All reports, drawings, plans, specifications, and other documents prepared by Consultant as products of service under this Agreement shall be the exclusive property of the City and all such materials shall be remitted to the City by Consultant in a timely manner upon completion, termination or cancellation of this Agreement. Consultant shall not use, willingly allow or cause to have such materials used for any purpose other than performance of Consultant’s obligations under this Agreement without the prior written consent of the City.

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Access to Confidential Information Each party acknowledges that the other party, its employees or agents, may be given access to Confidential Information relating to the other parties' business or the operation of this Agreement or any negotiations relating to this Agreement.

  • Ownership of Proprietary Information Unless otherwise provided by law any reports, histories, studies, tests, manuals, instructions, photographs, negatives, blue prints, plans, maps, data, system designs, computer code (which is intended to be consideration under this Contract), or any other documents or drawings, prepared or in the course of preparation by either party in performance of its obligations under this Contract shall be the joint property of both parties.

Time is Money Join Law Insider Premium to draft better contracts faster.