Sciweavers

345 search results - page 39 / 69
» When Systems Loose their Identity
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System
Quorum-based Power Saving (QPS) protocols have been proposed for ad hoc networks (e.g., IEEE 802.11 ad hoc mode) to increase energy efficiency and prolong the operational time of...
Shan-Hung Wu, Ming-Syan Chen, Chung-Min Chen
ICASSP
2008
IEEE
14 years 4 months ago
Confidence estimation, OOV detection and language ID using phone-to-word transduction and phone-level alignments
Automatic Speech Recognition (ASR) systems continue to make errors during search when handling various phenomena including noise, pronunciation variation, and out of vocabulary (O...
Christopher M. White, Geoffrey Zweig, Lukas Burget...
SSWMC
2004
13 years 11 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
TIT
2010
163views Education» more  TIT 2010»
13 years 4 months ago
Power-controlled feedback and training for two-way MIMO channels
Most communication systems use some form of feedback, often related to channel state information. The common models used in analyses either assume perfect channel state information...
Vaneet Aggarwal, Ashutosh Sabharwal
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
14 years 3 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker