Sciweavers

2015 search results - page 248 / 403
» Hidden Software Capabilities
Sort
View
BMCBI
2005
152views more  BMCBI 2005»
13 years 9 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
TASLP
2010
157views more  TASLP 2010»
13 years 4 months ago
HMM-Based Reconstruction of Unreliable Spectrographic Data for Noise Robust Speech Recognition
This paper presents a framework for efficient HMM-based estimation of unreliable spectrographic speech data. It discusses the role of Hidden Markov Models (HMMs) during minimum mea...
Bengt J. Borgstrom, Abeer Alwan
TASLP
2010
138views more  TASLP 2010»
13 years 4 months ago
Glimpsing IVA: A Framework for Overcomplete/Complete/Undercomplete Convolutive Source Separation
Abstract--Independent vector analysis (IVA) is a method for separating convolutedly mixed signals that significantly reduces the occurrence of the well-known permutation problem in...
Alireza Masnadi-Shirazi, Wenyi Zhang, Bhaskar D. R...
EUROSYS
2007
ACM
14 years 6 months ago
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
Continuously running systems require kernel software updates applied to them without downtime. Facilitating fast reboots, or delaying an update may not be a suitable solution in m...
Kristis Makris, Kyung Dong Ryu
CISIS
2009
IEEE
14 years 4 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...