Sciweavers

6978 search results - page 1209 / 1396
» On Proofs in System P
Sort
View
BMCBI
2010
149views more  BMCBI 2010»
13 years 9 months ago
KID - an algorithm for fast and efficient text mining used to automatically generate a database containing kinetic information o
Background: The amount of available biological information is rapidly increasing and the focus of biological research has moved from single components to networks and even larger ...
Stephanie Heinen, Bernhard Thielen, Dietmar Schomb...
CN
2008
117views more  CN 2008»
13 years 9 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
CEE
2007
110views more  CEE 2007»
13 years 9 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
PAMI
2008
160views more  PAMI 2008»
13 years 9 months ago
Emotion Recognition Based on Physiological Changes in Music Listening
Little attention has been paid so far to physiological signals for emotion recognition compared to audiovisual emotion channels such as facial expression or speech. This paper inve...
Jonghwa Kim, Elisabeth André
TASLP
2008
124views more  TASLP 2008»
13 years 9 months ago
Joint Dereverberation and Residual Echo Suppression of Speech Signals in Noisy Environments
Hands-free devices are often used in a noisy and reverberant environment. Therefore, the received microphone signal does not only contain the desired near-end speech signal but als...
Emanuel A. P. Habets, Sharon Gannot, Israel Cohen,...
« Prev « First page 1209 / 1396 Last » Next »