Sciweavers

1737 search results - page 245 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SPEECH
2011
14 years 9 months ago
The importance of phase in speech enhancement
Typical speech enhancement methods, based on the short-time Fourier analysis-modification-synthesis (AMS) framework, modify only the magnitude spectrum and keep the phase spectru...
Kuldip K. Paliwal, Kamil K. Wójcicki, Benja...
112
Voted
HVEI
2010
15 years 1 months ago
Quantifying the relationship between visual salience and visual importance
This paper presents the results of two psychophysical experiments and an associated computational analysis designed to quantify the relationship between visual salience and visual...
Junle Wang, Damon M. Chandler, Patrick Le Callet
136
Voted
INLG
2010
Springer
15 years 16 days ago
Situated Reference in a Hybrid Human-Robot Interaction System
We present the situated reference generation module of a hybrid human-robot interaction system that collaborates with a human user in assembling target objects from a wooden toy c...
Manuel Giuliani, Mary Ellen Foster, Amy Isard, Col...
124
Voted
COMCOM
2004
112views more  COMCOM 2004»
15 years 2 months ago
Design and analysis of optimal adaptive de-jitter buffers
In order to transfer voice or some other application requiring real-time delivery over a packet network, we need a de-jitter buffer to eliminate delay jitters. An important design...
Gagan L. Choudhury, Robert G. Cole
121
Voted
CCS
2004
ACM
15 years 8 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...