Sciweavers

2355 search results - page 401 / 471
» Anonymizing Temporal Data
Sort
View
ISCAS
2008
IEEE
139views Hardware» more  ISCAS 2008»
14 years 2 months ago
Missing feature speech recognition in a meeting situation with maximum SNR beamforming
Abstract— Especially for tasks like automatic meeting transcription, it would be useful to automatically recognize speech also while multiple speakers are talking simultaneously....
Dorothea Kolossa, Shoko Araki, Marc Delcroix, Tomo...
ISPDC
2008
IEEE
14 years 2 months ago
Load Balancing in Mesh-like Computations using Prediction Binary Trees
We present a load-balancing technique that exploits the temporal coherence, among successive computation phases, in mesh-like computations to be mapped on a cluster of processors....
Biagio Cosenza, Gennaro Cordasco, Rosario De Chiar...
SADFE
2008
IEEE
14 years 2 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
TIME
2008
IEEE
14 years 2 months ago
Representing Public Transport Schedules as Repeating Trips
The movement in public transport networks is organized according to schedules. The real-world schedules are specified by a set of periodic rules and a number of irregularities fr...
Romans Kasperovics, Michael H. Böhlen, Johann...
DATE
2007
IEEE
123views Hardware» more  DATE 2007»
14 years 2 months ago
Clock domain crossing fault model and coverage metric for validation of SoC design
Multiple asynchronous clock domains have been increasingly employed in System-on-Chip (SoC) designs for different I/O interfaces. Functional validation is one of the most expensiv...
Yi Feng 0002, Zheng Zhou, Dong Tong, Xu Cheng