Sciweavers

956 search results - page 162 / 192
» Source Constrained Clustering
Sort
View
ICASSP
2007
IEEE
14 years 5 months ago
Blind Speech Separation in a Meeting Situation with Maximum SNR Beamformers
We propose a speech separation method for a meeting situation, where each speaker sometimes speaks and the number of speakers changes every moment. Many source separation methods ...
Shoko Araki, Hiroshi Sawada, Shoji Makino
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
14 years 5 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
DEXA
2007
Springer
154views Database» more  DEXA 2007»
14 years 5 months ago
Performance Oriented Schema Matching
Abstract. Semantic matching of schemas in heterogeneous data sharing systems is time consuming and error prone. Existing mapping tools employ semi-automatic techniques for mapping ...
Khalid Saleem, Zohra Bellahsene, Ela Hunt
PVM
2007
Springer
14 years 5 months ago
Revealing the Performance of MPI RMA Implementations
The MPI remote-memory access (RMA) operations provide a different programming model from the regular MPI-1 point-to-point operations. This model is particularly appropriate for ca...
William D. Gropp, Rajeev Thakur
UCS
2007
Springer
14 years 5 months ago
Mobility Helps Data Delivery in Disruption Tolerant Networks
Abstract. Sensor networks using mobile robots have recently been proposed to deal with data communication in disruption tolerant networks (DTNs) where an instantaneous end-to-end p...
Kaoru Sezaki, Niwat Thepvilojanapong, Yoshito Tobe