Sciweavers

4266 search results - page 724 / 854
» The container loading problem
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 11 months ago
Negative Database for Data Security
Data Security is a major issue in any web-based application. There have been approaches to handle intruders in any system, however, these approaches are not fully trustable; evide...
Anup Patel, Niveeta Sharma, Magdalini Eirinaki
HICSS
2011
IEEE
183views Biometrics» more  HICSS 2011»
12 years 11 months ago
Optimizing Access across Multiple Hierarchies in Data Warehouses
In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and b...
Lipyeow Lim, Bishwaranjan Bhattacharjee
ICASSP
2011
IEEE
12 years 11 months ago
Time-frequency segmentation of bird song in noisy acoustic environments
Recent work in machine learning considers the problem of identifying bird species from an audio recording. Most methods require segmentation to isolate each syllable of bird call ...
Lawrence Neal, Forrest Briggs, Raviv Raich, Xiaoli...
ICASSP
2011
IEEE
12 years 11 months ago
Exploring implicit score normalization techniques in speaker verification
In this paper we first introduce four kinds of modification of Symmetric Scoring [1] which produce likelihood ratios that do not need to be explicitly normalized, i.e. T-norm, Z...
Ce Zhang, Rong Zheng, Bo Xu
ICASSP
2011
IEEE
12 years 11 months ago
A near-optimal least squares solution to received signal strength difference based geolocation
A simple geometric interpretation for received signal strength (RSS) difference based geolocation can be illustrated by considering a plane containing a single pair of receivers a...
Sichun Wang, Robert J. Inkol