Sciweavers

12551 search results - page 2357 / 2511
» Reuse in Systems Engineering
Sort
View
116
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
SIGIR
2010
ACM
14 years 10 months ago
Efficient partial-duplicate detection based on sequence matching
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...
Qi Zhang, Yue Zhang, Haomin Yu, Xuanjing Huang
STTT
2010
120views more  STTT 2010»
14 years 10 months ago
Solving the ignoring problem for partial order reduction
Abstract. Partial order reduction limits the state explosion problem that arises in model checking by limiting the exploration of redundant interleavings. A state space search algo...
Sami Evangelista, Christophe Pajault
TASLP
2010
106views more  TASLP 2010»
14 years 10 months ago
Efficient and Robust Music Identification With Weighted Finite-State Transducers
We present an approach to music identification based on weighted finite-state transducers and Gaussian mixture models, inspired by techniques used in large-vocabulary speech recogn...
Mehryar Mohri, Pedro Moreno, Eugene Weinstein
TASLP
2010
96views more  TASLP 2010»
14 years 10 months ago
Evaluating Source Separation Algorithms With Reverberant Speech
This paper examines the performance of several source separation systems on a speech separation task for which human intelligibility has previously been measured. For anechoic mixt...
Michael I. Mandel, S. Bressler, Barbara G. Shinn-C...
« Prev « First page 2357 / 2511 Last » Next »