Sciweavers

8135 search results - page 1486 / 1627
» network 2008
Sort
View
ICASSP
2008
IEEE
15 years 10 months ago
On security-aware transmission scheduling
The problem of interest is to characterize to what extent nodes independently following certain transmission schedules can be hijacked to relay flows of information packets. Info...
Ting He, Ameya Agaskar, Lang Tong
130
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Link throughput of multi-channel opportunistic access with limited sensing
—We aim to characterize the maximum link throughput of a multi-channel opportunistic communication system. The states of these channels evolve as independent and identically dist...
Keqin Liu, Qing Zhao
137
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Stability analysis of the consensus-based distributed LMS algorithm
We deal with consensus-based online estimation and tracking of (non-) stationary signals using ad hoc wireless sensor networks (WSNs). A distributed (D-) least-mean square (LMS) l...
Ioannis D. Schizas, Gonzalo Mateos, Georgios B. Gi...
142
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Bayesian update of dialogue state for robust dialogue systems
This paper presents a new framework for accumulating beliefs in spoken dialogue systems. The technique is based on updating a Bayesian Network that represents the underlying state...
Blaise Thomson, Jost Schatzmann, Steve Young
127
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Polyphase speech recognition
We propose a model for speech recognition that consists of multiple semi-synchronized recognizers operating on a polyphase decomposition of standard speech features. Specifically...
Hui Lin, Jeff Bilmes
« Prev « First page 1486 / 1627 Last » Next »