Sciweavers

2997 search results - page 517 / 600
» Fuzzy robustness analysis
Sort
View
IEICET
2006
100views more  IEICET 2006»
13 years 8 months ago
Generating F0 Contours by Statistical Manipulation of Natural F0 Shapes
This paper proposes a method of generating F0 contours from natural F0 segmental shapes for speech synthesis. The extracted shapes of F0 units are basically kept unchanged, by eli...
Takashi Saito
ITIIS
2008
128views more  ITIIS 2008»
13 years 8 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
CONCURRENCY
2007
101views more  CONCURRENCY 2007»
13 years 8 months ago
OpenUH: an optimizing, portable OpenMP compiler
OpenMP has gained wide popularity as an API for parallel programming on shared memory and distributed shared memory platforms. Despite its broad availability, there remains a need ...
Chunhua Liao, Oscar Hernandez, Barbara M. Chapman,...
JCM
2008
73views more  JCM 2008»
13 years 8 months ago
Secure and Distributed P2P Reputation Management
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way...
Jianli Hu, Quanyuan Wu, Bin Zhou
CSDA
2007
128views more  CSDA 2007»
13 years 8 months ago
Computational methods for case-cohort studies
Computational methods, which can be implemented using standard Cox regression software, are given for fitting “exact” pseudolikehood estimates and robust and asymptotic varia...
Bryan Langholz, Jenny Jiao