Sciweavers

13043 search results - page 2374 / 2609
» Simulation of the research process
Sort
View
112
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Speech inversion: Benefits of tract variables over pellet trajectories
Speech inversion is a way of estimating articulatory trajectories or vocal tract configurations from the acoustic speech signal. Traditionally, articulator flesh-point or pellet t...
Vikramjit Mitra, Hosung Nam, Carol Y. Espy-Wilson,...
138
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Modeling nodal prices in deregulated electricity markets in the usa: current practices and future needs
The purpose of this paper is to model the stochastic behavior of the nodal prices of electricity in deregulated markets in the USA, and in particular, to explain how this behavior...
Timothy D. Mount
144
Voted
ICASSP
2011
IEEE
14 years 7 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
CACM
2011
134views more  CACM 2011»
14 years 7 months ago
Brain-computer interfaces for communication and control
For many years people have speculated that electroencephalographic activity or other electrophysiological measures of brain function might provide a new non-muscular channel for s...
Dennis J. McFarland, Jonathan R. Wolpaw
SAC
2011
ACM
14 years 6 months ago
ImageAlert: credibility analysis of text-image pairs on the web
Although the Web lets users freely browse and publish information, most Web information is unauthorized in contrast to conventional mass media. Therefore, it is not always credibl...
Yusuke Yamamoto, Katsumi Tanaka
« Prev « First page 2374 / 2609 Last » Next »