Sciweavers

2229 search results - page 253 / 446
» Comparative analysis of biclustering algorithms
Sort
View
ICMCS
2006
IEEE
129views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Speaker Identification using a Microphone Array and a Joint HMM with Speech Spectrum and Angle of Arrival
In this paper, we present a speaker identification algorithm for a microphone array based on a first-order joint Hidden Markov Model (HMM) where the observations correspond to t...
Jack W. Stokes, John C. Platt, Sumit Basu
IMC
2006
ACM
14 years 4 months ago
Shared-state sampling
We present an algorithm, Shared-State Sampling (S3 ), for the problem of detecting large flows in high-speed networks. While devised with different principles in mind, S3 turns ...
Frederic Raspall, Sebastià Sallent, Josep Y...
ISPD
2006
ACM
126views Hardware» more  ISPD 2006»
14 years 4 months ago
Noise driven in-package decoupling capacitor optimization for power integrity
The existing decoupling capacitance optimization approaches meet constraints on input impedance for package. In this paper, we show that using impedance as constraints leads to la...
Jun Chen, Lei He
ICRA
2005
IEEE
140views Robotics» more  ICRA 2005»
14 years 4 months ago
Fast Reinforcement Learning for Vision-guided Mobile Robots
— This paper presents a new reinforcement learning algorithm for accelerating acquisition of new skills by real mobile robots, without requiring simulation. It speeds up Q-learni...
Tomás Martínez-Marín, Tom Duc...
NDSS
2003
IEEE
14 years 4 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal