Sciweavers

7529 search results - page 1501 / 1506
» The Modula-3 Type System
Sort
View
IJNSEC
2007
253views more  IJNSEC 2007»
13 years 7 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
IJON
2007
184views more  IJON 2007»
13 years 7 months ago
Convex incremental extreme learning machine
Unlike the conventional neural network theories and implementations, Huang et al. [Universal approximation using incremental constructive feedforward networks with random hidden n...
Guang-Bin Huang, Lei Chen
SPEECH
2008
97views more  SPEECH 2008»
13 years 7 months ago
A new approach for the adaptation of HMMs to reverberation and background noise
Looking at practical application scenarios of speech recognition systems several distortion effects exist that have a major influence on the speech signal and can considerably det...
Hans-Günter Hirsch, Harald Finster
TCAD
2008
101views more  TCAD 2008»
13 years 7 months ago
Using Field-Repairable Control Logic to Correct Design Errors in Microprocessors
Functional correctness is a vital attribute of any hardware design. Unfortunately, due to extremely complex architectures, widespread components, such as microprocessors, are often...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
TCSV
2008
102views more  TCSV 2008»
13 years 7 months ago
Semantic Analysis for Automatic Event Recognition and Segmentation of Wedding Ceremony Videos
Wedding is one of the most important ceremonies in our lives. It symbolizes the birth and creation of a new family. In this paper, we present a system for automatically segmenting ...
Wen-Huang Cheng, Yung-Yu Chuang, Yin-Tzu Lin, Chi-...
« Prev « First page 1501 / 1506 Last » Next »