Sciweavers

10263 search results - page 1987 / 2053
» From Use Cases to System Operation Specifications
Sort
View
TASLP
2008
143views more  TASLP 2008»
13 years 8 months ago
Strategies to Improve the Robustness of Agglomerative Hierarchical Clustering Under Data Source Variation for Speaker Diarizatio
Many current state-of-the-art speaker diarization systems exploit agglomerative hierarchical clustering (AHC) as their speaker clustering strategy, due to its simple processing str...
K. J. Han, S. Kim, S. S. Narayanan
TWC
2008
159views more  TWC 2008»
13 years 8 months ago
Resource allocation for spectrum underlay in cognitive radio networks
A resource allocation framework is presented for spectrum underlay in cognitive radio networks. We consider both interference constraints for primary users and quality of service (...
Long Bao Le, Ekram Hossain
DAC
2006
ACM
14 years 9 months ago
A thermally-aware performance analysis of vertically integrated (3-D) processor-memory hierarchy
Three-dimensional (3-D) integrated circuits have emerged as promising candidates to overcome the interconnect bottlenecks of nanometer scale designs. While they offer several othe...
Gian Luca Loi, Banit Agrawal, Navin Srivastava, Sh...
WWW
2004
ACM
14 years 9 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
MOBISYS
2009
ACM
14 years 9 months ago
Longitudinal study of a building-scale RFID ecosystem
Radio Frequency IDentification (RFID) deployments are becoming increasingly popular in both industrial and consumer-oriented settings. To effectively exploit and operate such depl...
Evan Welbourne, Karl Koscher, Emad Soroush, Magdal...
« Prev « First page 1987 / 2053 Last » Next »