Sciweavers

603 search results - page 99 / 121
» Embedded Formulas Extraction
Sort
View
CIARP
2004
Springer
14 years 28 days ago
Speaker Verification Using Coded Speech
Abstract. The implementation of a pseudo text-independent Speaker Verification system is described. This system was designed to use only information extracted directly from the cod...
Antonio Moreno-Daniel, Biing-Hwang Juang, Juan Art...
ICDS
2010
IEEE
14 years 25 days ago
Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework
Abstract—Recently, two complementary approaches are proposed to represent, model and analyze laws: the Nomos and VLPM approaches. Nomos is a goal-oriented approach to effectively...
Adolfo Villafiorita, Komminist Weldemariam, Angelo...
ATS
2003
IEEE
131views Hardware» more  ATS 2003»
14 years 25 days ago
Software-Based Delay Fault Testing of Processor Cores
Software-based self-testing is a promising approach for the testing of processor cores which are embedded inside a System-on-a-Chip (SoC), as it can apply test vectors in function...
Virendra Singh, Michiko Inoue, Kewal K. Saluja, Hi...
HICSS
2003
IEEE
161views Biometrics» more  HICSS 2003»
14 years 24 days ago
Enhanced Knowledge Management with eXtensible Rule Markup Language
XML has become the standard platform for structured data exchange on the Web. Next concern of Semantic Web is the exchange of rules in markup language form. The rules should be re...
Jae Kyu Lee, Mye M. Sohn
WCRE
2003
IEEE
14 years 24 days ago
RegReg: a Lightweight Generator of Robust Parsers for Irregular Languages
In reverse engineering, parsing may be partially done to extract lightweight source models. Parsing code containing preprocessing directives, syntactical errors and embedded langu...
Mario Latendresse