Sciweavers

3389 search results - page 143 / 678
» Perspectives on system identification
Sort
View
JCP
2008
206views more  JCP 2008»
13 years 8 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
LREC
2008
119views Education» more  LREC 2008»
13 years 9 months ago
Text Independent Speaker Identification in Multilingual Environments
Speaker identification and verification systems have a poor performance when model training is done in one language while the testing is done in another. This situation is not unu...
Iker Luengo, Eva Navas, Iñaki Sainz, Ibon S...
AUTOMATICA
2008
123views more  AUTOMATICA 2008»
13 years 8 months ago
Identification with stochastic sampling time jitter
This work investigates how stochastic sampling jitter noise affects the result of system identification, and proposes a modification of known approaches to mitigate the effects of...
Frida Eng, Fredrik Gustafsson
SERVICES
2008
59views more  SERVICES 2008»
13 years 9 months ago
Standardizing Web Services: Overcoming 'Design by Committee'
Web service standards, like several other IT standards, are anticipatory, i.e., they are designed and codified in anticipation of actual adoption and use. As a result, the setting...
Sandeep Purao, John W. Bagby, Karthikeyan Umapathy
APAL
2007
83views more  APAL 2007»
13 years 8 months ago
On Feferman's operational set theory OST
We study OST and some of its most important extensions primarily from a proof-theoretic perspective, determine their consistency strengths by exhibiting equivalent systems in the ...
Gerhard Jäger