Sciweavers

72 search results - page 10 / 15
» Handling Identity in Peer-to-Peer Systems
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Confidence estimation, OOV detection and language ID using phone-to-word transduction and phone-level alignments
Automatic Speech Recognition (ASR) systems continue to make errors during search when handling various phenomena including noise, pronunciation variation, and out of vocabulary (O...
Christopher M. White, Geoffrey Zweig, Lukas Burget...
DATE
2007
IEEE
125views Hardware» more  DATE 2007»
14 years 4 months ago
Simulation platform for UHF RFID
1 Developing modern integrated and embedded systems require well-designed processes to ensure flexibility and independency. These features are related to exchangeability of hardw...
Vojtech Derbek, Christian Steger, Reinhold Weiss, ...
ISVLSI
2003
IEEE
147views VLSI» more  ISVLSI 2003»
14 years 3 months ago
Automated Dynamic Memory Data Type Implementation Exploration and Optimization
The behavior of many algorithms is heavily determined by the input data. Furthermore, this often means that multiple and completely different execution paths can be followed, also...
Marc Leeman, Chantal Ykman-Couvreur, David Atienza...
BMCBI
2006
130views more  BMCBI 2006»
13 years 10 months ago
Laboratory Information Management Software for genotyping workflows: applications in high throughput crop genotyping
Background: With the advances in DNA sequencer-based technologies, it has become possible to automate several steps of the genotyping process leading to increased throughput. To e...
B. Jayashree, Praveen T. Reddy, Y. Leeladevi, Jona...
PERCOM
2008
ACM
14 years 9 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart