Sciweavers

1931 search results - page 301 / 387
» A BitTorrent Performance Evaluation Framework
Sort
View
CSDA
2007
120views more  CSDA 2007»
13 years 9 months ago
Boosting ridge regression
Ridge regression is a well established method to shrink regression parameters towards zero, thereby securing existence of estimates. The present paper investigates several approac...
Gerhard Tutz, Harald Binder
LRE
2006
173views more  LRE 2006»
13 years 9 months ago
Automatic induction of language model data for a spoken dialogue system
When building a new spoken dialogue application, large amounts of domain specific data are required. This paper addresses the issue of generating in-domain training data when litt...
Chao Wang, Grace Chung, Stephanie Seneff
TWC
2008
169views more  TWC 2008»
13 years 9 months ago
Antenna subset diversity with non-ideal channel estimation
In modern wireless systems employing diversity techniques, combining all the available diversity branches may not be feasible due to complexity and resource constraints. To allevia...
Wesley M. Gifford, Moe Z. Win, Marco Chiani
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 8 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
TASLP
2002
84views more  TASLP 2002»
13 years 8 months ago
Maximum likelihood multiple subspace projections for hidden Markov models
The first stage in many pattern recognition tasks is to generate a good set of features from the observed data. Usually, only a single feature space is used. However, in some compl...
Mark J. F. Gales