Sciweavers

345 search results - page 13 / 69
» When Systems Loose their Identity
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
A study of the effect of emotional state upon text-independent speaker identification
In this paper we evaluate the effect of the emotional state of a speaker when text-independent speaker identification is performed. The spectral features used for speaker recogni...
Marius Vasile Ghiurcau, Corneliu Rusu, Jaakko Asto...
HOTOS
2007
IEEE
13 years 11 months ago
Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical
Given that the majority of future processors will contain an abundance of execution cores, redundant execution can offer a promising method for increasing the availability and res...
Jesse Pool, Ian Sin Kwok Wong, David Lie
JAISE
2010
88views Algorithms» more  JAISE 2010»
13 years 2 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
SAC
2010
ACM
14 years 2 months ago
A wavelet-based sampling algorithm for wireless sensor networks applications
This work proposes and evaluates a sampling algorithm based on wavelet transforms with Coiflets basis to reduce the data sensed in wireless sensor networks applications. The Coi...
André L. L. de Aquino, Ricardo A. R. Olivei...
CORR
2006
Springer
80views Education» more  CORR 2006»
13 years 7 months ago
Exact Failure Frequency Calculations for Extended Systems
This paper shows how the steady-state availability and failure frequency can be calculated in a single pass for very large systems, when the availability is expressed as a product...
Annie Druault-Vicard, Christian Tanguy