Sciweavers

3016 search results - page 589 / 604
» Disappearing mobile devices
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Adaptation of compressed HMM parameters for resource-constrained speech recognition
Recently, we successfully developed and reported a new unsupervised online adaptation technique, which jointly compensates for additive and convolutive distortions with vector Tay...
Jinyu Li, Li Deng, Dong Yu, Jian Wu, Yifan Gong, A...
INFOCOM
2008
IEEE
14 years 2 months ago
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks
—The overlay-based network architecture has been recognized as an effective way to deal with the funneling effect in sensor networks, where sensors closer to the sink are usually...
Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang
SUTC
2008
IEEE
14 years 2 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
VTC
2008
IEEE
107views Communications» more  VTC 2008»
14 years 2 months ago
TOA Estimation Enhancement based on Blind Calibration of Synthetic Arrays
—The accuracy of Time of Arrival (TOA) measurements is significantly compromised due to the multipath components which coexist with the desired Line of Sight (LOS) components in ...
Ali Broumandan, John Nielsen, Gérard Lachap...
WIMOB
2008
IEEE
14 years 2 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao