Sciweavers

1368 search results - page 174 / 274
» Avoiding Simplicity Is Complex
Sort
View
86
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
87
Voted
ICDM
2008
IEEE
106views Data Mining» more  ICDM 2008»
15 years 9 months ago
Boosting Relational Sequence Alignments
The task of aligning sequences arises in many applications. Classical dynamic programming approaches require the explicit state enumeration in the reward model. This is often impr...
Andreas Karwath, Kristian Kersting, Niels Landwehr
142
Voted
ICMCS
2008
IEEE
287views Multimedia» more  ICMCS 2008»
15 years 9 months ago
Video transmission scheduling for peer-to-peer live streaming systems
For Internet based video broadcasting applications such as IPTV, the Peer-to-Peer (P2P) streaming scheme has been found to be an effective solution. An important issue in live bro...
Ying Li, Zhu Li, Mung Chiang, A. Robert Calderbank
140
Voted
ICMCS
2008
IEEE
208views Multimedia» more  ICMCS 2008»
15 years 9 months ago
Fast computation of general Fourier Transforms on GPUS
We present an implementation of general FFTs for graphics processing units (GPUs). Unlike most existing GPU FFT implementations, we handle both complex and real data of any size t...
Brandon Lloyd, Chas Boyd, Naga K. Govindaraju
129
Voted
ISCA
2008
IEEE
165views Hardware» more  ISCA 2008»
15 years 9 months ago
Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory
We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be m...
Lee Baugh, Naveen Neelakantam, Craig B. Zilles