Sciweavers

44 search results - page 6 / 9
» Comparison of voice activity detection algorithms for VoIP
Sort
View
CN
2002
98views more  CN 2002»
13 years 7 months ago
New models and algorithms for programmable networks
In todays IP networks most of the network control and management tasks are performed at the end points. As a result, many important network functions cannot be optimized due to la...
Danny Raz, Yuval Shavitt
BILDMED
2009
217views Algorithms» more  BILDMED 2009»
13 years 5 months ago
Evaluation Scheme for a Positron Emission Tomography System Used in Monitoring of Radiation Therapy
Abstract. Positron emission tomography (PET) is used for independent monitoring of dose delivery in ion therapy. An in-beam PET scanner registers the annihilation γ-rays following...
Georgy Shakirin, Fine Fiedler, Wolfgang Enghardt
LREC
2008
134views Education» more  LREC 2008»
13 years 9 months ago
A Multi-sensor Speech Database with Applications towards Robust Speech Processing in hostile Environments
In this paper, we present a database with speech in different types of background noises. The speech and noise were recorded with a set of different microphones and including some...
Tomas Dekens, Yorgos Patsis, Werner Verhelst, Fr&e...
BMCBI
2005
92views more  BMCBI 2005»
13 years 7 months ago
Predicting functional sites with an automated algorithm suitable for heterogeneous datasets
Background: In a previous report (La et al., Proteins, 2005), we have demonstrated that the identification of phylogenetic motifs, protein sequence fragments conserving the overal...
David La, Dennis R. Livesay
ACSAC
2007
IEEE
13 years 11 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon