Sciweavers

6656 search results - page 1124 / 1332
» Change, Change, Change: Three Approaches
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Multiple-channel detection of a Gaussian time series over frequency-flat channels
This work addresses the problem of deciding whether a set of realizations of a vector-valued time series with unknown temporal correlation are spatially correlated or not. Speciï¬...
David Ramírez, Javier Vía, Ignacio S...
ICASSP
2011
IEEE
13 years 1 months ago
Steady-state analysis of the NLMS algorithm with reusing coefficient vector and a method for improving its performance
The reuse of past coefï¬cient vectors of the NLMS for reducing the steady-state MSD in a low signal-to-noise ratio (SNR) was proposed recently. Its convergence analysis has not b...
Seong-Eun Kim, Jae-Woo Lee, Woo-Jin Song
ICASSP
2011
IEEE
13 years 1 months ago
Scalable robust hypothesis tests using graphical models
Traditional binary hypothesis testing relies on the precise knowledge of the probability density of an observed random vector conditioned on each hypothesis. However, for many app...
Divyanshu Vats, Vishal Monga, Umamahesh Srinivas, ...
ICASSP
2011
IEEE
13 years 1 months ago
Constrained discriminative mapping transforms for unsupervised speaker adaptation
Discriminative mapping transforms (DMTs) is an approach to robustly adding discriminative training to unsupervised linear adaptation transforms. In unsupervised adaptation DMTs ar...
Langzhou Chen, Mark J. F. Gales, K. K. Chin
AICT
2010
IEEE
216views Communications» more  AICT 2010»
13 years 29 days ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
« Prev « First page 1124 / 1332 Last » Next »