Sciweavers

250 search results - page 36 / 50
» Lost source provenance
Sort
View
EUROSEC
2009
ACM
14 years 2 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
ICASSP
2009
IEEE
14 years 2 months ago
A flat direct model for speech recognition
We introduce a direct model for speech recognition that assumes an unstructured, i.e., flat text output. The flat model allows us to model arbitrary attributes and dependences o...
Georg Heigold, Geoffrey Zweig, Xiao Li, Patrick Ng...
ICASSP
2009
IEEE
14 years 2 months ago
DOA estimation of quasi-stationary signals via Khatri-Rao subspace
This paper addresses the problem of direction-of-arrival (DOA) estimation of quasi-stationary signals, which finds applications in array processing of speech and audio. By studyi...
Wing-Kin Ma, Tsung-Han Hsieh, Chong-Yung Chi
ICDCSW
2009
IEEE
14 years 2 months ago
An Approach to Middleware Specialization for Cyber Physical Systems
Contemporary computing infrastructure, such as networking stacks, OS and middleware, are made up of layers of software functionality that have evolved over decades to support the ...
Akshay Dabholkar, Aniruddha S. Gokhale
WEBI
2009
Springer
14 years 2 months ago
Improving Movie Gross Prediction through News Analysis
—Traditional movie gross predictions are based on numerical and categorical movie data. But since the 1990s, text sources such as news have been proven to carry extra and meaning...
Wenbin Zhang, Steven Skiena