Sciweavers

ACSC
2006
IEEE
14 years 5 months ago
On compensating the Mel-frequency cepstral coefficients for noisy speech recognition
This paper describes a novel noise-robust automatic speech recognition (ASR) front-end that employs a combination of Mel-filterbank output compensation and cumulative distribution...
Eric H. C. Choi
ACSC
2006
IEEE
14 years 5 months ago
Pruning subscriptions in distributed publish/subscribe systems
Publish/subscribe systems utilize filter algorithms to determine all subscriptions matching incoming event messages. To distribute such services, subscriptions are forwarded to s...
Sven Bittner, Annika Hinze
ACSC
2006
IEEE
14 years 5 months ago
Plagiarism detection across programming languages
Plagiarism is a widespread problem in assessment tasks; in computing courses, students often plagiarise source code. For all but the smallest classes, manual detection of such pla...
Christian Arwin, Seyed M. M. Tahaghoghi
ACSC
2006
IEEE
14 years 5 months ago
Rendering multi-perspective images with trilinear projection
Non-linear projections of 3D graphical scenes can be used to compute reflections and refractions in curved surfaces, draw artistic images in the style of Escher or Picasso, and p...
Scott Vallance, Paul R. Calder
ACSC
2006
IEEE
14 years 5 months ago
A semantic approach to boost passage retrieval effectiveness for question answering
In the current state of the rapid growth of information resources and the huge number of requests submitted by users to existing information retrieval systems; recently, Question ...
Bahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh
ACSC
2006
IEEE
14 years 5 months ago
Segregated failures model for availability evaluation of fault-tolerant systems
This paper presents a method of estimating the availability of fault-tolerant computer systems with several recovery procedures. A segregated failures model has been proposed rece...
Sergiy A. Vilkomir, David Lorge Parnas, Veena B. M...
ACSC
2006
IEEE
14 years 5 months ago
Identifying refactoring opportunities by identifying dependency cycles
The purpose of refactoring is to improve the quality of a software system by changing its internal design so that it is easier to understand or modify, or less prone to errors and...
Hayden Melton, Ewan D. Tempero
ACSC
2006
IEEE
14 years 5 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
ACSC
2006
IEEE
14 years 5 months ago
Shallow NLP techniques for internet search
Information Retrieval (IR) is a major component in many of our daily activities, with perhaps its most prominent role manifested in search engines. Today’s most advanced engines...
Alex Penev, Raymond K. Wong
ACSC
2006
IEEE
14 years 5 months ago
A framework for visual data mining of structures
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...
Hans-Jörg Schulz, Thomas Nocke, Heidrun Schum...