Sciweavers

6978 search results - page 66 / 1396
» Reframing Requirements Analysis
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
A comparative analysis of biometric secret-key binding schemes based on QIM and Wyner-Ziv coding
Biometric secret-key binding inherently requires signal processing and error correction schemes due to noisy measurement readings. Two previously proposed strategies, Quantization...
Aniketh Talwai, Francis Minhthang Bui, Ashish Khis...
ICASSP
2011
IEEE
13 years 1 months ago
Analysis of rate constraints for MWF-based noise reduction in acoustic sensor networks
In an acoustic sensor network, consisting of spatially distributed microphone nodes, a significant noise reduction can be achieved using the centralized multi-channel Wiener fil...
Toby Christian Lawin-Ore, Simon Doclo
INFOCOM
2011
IEEE
13 years 1 months ago
Analysis and algorithms for partial protection in mesh networks
—This paper develops a mesh network protection scheme that guarantees a quantifiable minimum grade of service upon a failure within a network. The scheme guarantees that a fract...
Greg Kuperman, Eytan Modiano, Aradhana Narula-Tam
ACL
2012
12 years 17 days ago
Fast Syntactic Analysis for Statistical Language Modeling via Substructure Sharing and Uptraining
Long-span features, such as syntax, can improve language models for tasks such as speech recognition and machine translation. However, these language models can be difficult to u...
Ariya Rastrow, Mark Dredze, Sanjeev Khudanpur
TMM
2010
149views Management» more  TMM 2010»
13 years 4 months ago
Joint Compressive Video Coding and Analysis
Traditionally, video acquisition, coding and analysis have been designed and optimized as independent tasks. This has a negative impact in terms of consumed resources, as most of ...
M. Cossalter, Giuseppe Valenzise, Marco Tagliasacc...