Sciweavers

1008 search results - page 51 / 202
» Canonicity!
Sort
View
110
Voted
INTERSPEECH
2010
14 years 9 months ago
A comparative study of constrained and unconstrained approaches for segmentation of speech signal
In this work, we compare different approaches for speech segmentation, of which some are constrained and the remaining are unconstrained by phone transcript. A high accuracy speec...
Venkatesh Keri, Kishore Prahallad
140
Voted
ITIIS
2010
190views more  ITIIS 2010»
14 years 9 months ago
An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Gwo-Ching Chang, Yue-Der Lin
121
Voted
STOC
2006
ACM
180views Algorithms» more  STOC 2006»
16 years 2 months ago
Pricing for fairness: distributed resource allocation for multiple objectives
In this paper, we present a simple distributed algorithm for resource allocation which simultaneously approximates the optimum value for a large class of objective functions. In p...
Sung-woo Cho, Ashish Goel
100
Voted
CSL
2006
Springer
15 years 6 months ago
Weak Bisimulation Approximants
Abstract. Bisimilarity and weak bisimilarity are canonical notions of equivalence between processes, which are defined co-inductively, but may be approached
Will Harwood, Faron Moller, Anton Setzer
103
Voted
COMBINATORICS
2002
77views more  COMBINATORICS 2002»
15 years 2 months ago
Motzkin Paths and Reduced Decompositions for Permutations with Forbidden Patterns
We obtain a characterization of (321, 3
William Y. C. Chen, Eva Yu-Ping Deng, Laura L. M. ...