Sciweavers

963 search results - page 93 / 193
» Rethinking Algorithm Design and Development in Speech Proces...
Sort
View
SIES
2009
IEEE
14 years 3 months ago
Programmable temporal isolation through variable-bandwidth servers
—We introduce variable-bandwidth servers (VBS) for scheduling and executing processes under programmable temporal isolation. A VBS is an extension of a constant-bandwidth server ...
Silviu S. Craciunas, Christoph M. Kirsch, Hannes P...
ICASSP
2008
IEEE
14 years 3 months ago
Robust multiuser detection based on probability constrained optimization of the MMSE receiver
The performance of multiuser detection (MUD) algorithms for codedivision multiple-access (CDMA) systems depends on the accuracy of channel estimates. Such estimates are typically ...
Sergiy A. Vorobyov
AEI
2006
108views more  AEI 2006»
13 years 9 months ago
Grammatical rules for specifying information for automated product data modeling
This paper presents a linguistic framework for developing a formal knowledge acquisition method. The framework is intended to empower domain experts to specify information require...
Ghang Lee, Charles M. Eastman, Rafael Sacks, Shamk...
RECOMB
2004
Springer
14 years 9 months ago
Comparing in situ mRNA expression patterns of drosophila embryos
In situ staining of a target mRNA at several time points during the development of a D. melanogaster embryo gives one a detailed spatio-temporal view of the expression pattern of ...
Hanchuan Peng, Eugene W. Myers
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 10 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu