Sciweavers

3128 search results - page 566 / 626
» Finite element method
Sort
View
109
Voted
CSL
2004
Springer
15 years 2 months ago
Factor analysed hidden Markov models for speech recognition
Recently various techniques to improve the correlation model of feature vector elements in speech recognition systems have been proposed. Such techniques include semi-tied covaria...
Antti-Veikko I. Rosti, M. J. F. Gales
127
Voted
CTW
2004
81views more  CTW 2004»
15 years 2 months ago
Rating non-technical skills: developing a behavioural marker system for use in anaesthesia
Studies of performance in medicine are often based on observation. Videotape provides a valuable tool for recording events from both real environments and simulators. When analysin...
G. Fletcher, R. Flin, P. McGeorge, R. Glavin, N. M...
120
Voted
ETS
2000
IEEE
82views Hardware» more  ETS 2000»
15 years 2 months ago
Towards a Philosophy of Instruction
What is the nature of instructional design? Is instructional design merely the practical application of learning theories to learning situations? What elements form the building b...
J. Michael Spector
122
Voted
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
15 years 2 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...
122
Voted
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
15 years 2 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...