Sciweavers

Share
ICASSP
2011
IEEE
8 years 7 months ago
Effective multi-resolution background subtraction
In this paper, we propose a novel multi-resolution background subtraction method. We adopt coarse to fine strategy, which is the essence the multi-resolution scheme, to obtain th...
LingFeng Wang, Chunhong Pan
ICASSP
2011
IEEE
8 years 7 months ago
Investigations into the incorporation of the Ideal Binary Mask in ASR
While much work has been dedicated to exploring how best to incorporate the Ideal Binary Mask (IBM) in automatic speech recognition (ASR) for noisy signals, we demonstrate that th...
William Hartmann, Eric Fosler-Lussier
ICCAD
2009
IEEE
151views Hardware» more  ICCAD 2009»
9 years 1 months ago
GREMA: Graph reduction based efficient mask assignment for double patterning technology
Double patterning technology (DPT) has emerged as the most hopeful candidate for the next technology node of the ITRS roadmap [1]. The goal of a DPT decomposer is to decompose the...
Yue Xu, Chris Chu
SPEECH
2010
136views more  SPEECH 2010»
9 years 2 months ago
Robust speech recognition by integrating speech separation and hypothesis testing
Missing data methods attempt to improve robust speech recognition by distinguishing between reliable and unreliable data in the time-frequency domain. Such methods require a binar...
Soundararajan Srinivasan, DeLiang L. Wang
ASPDAC
2005
ACM
81views Hardware» more  ASPDAC 2005»
9 years 6 months ago
Design and design automation of rectification logic for engineering change
In a later stage of a VLSI design, it is quite often to modify a design implementation to accommodate the new specification, design errors, or to meet design constraints. In addit...
Cheng-Hung Lin, Yung-Chang Huang, Shih-Chieh Chang...
ATS
1998
IEEE
170views Hardware» more  ATS 1998»
9 years 8 months ago
A Ring Architecture Strategy for BIST Test Pattern Generation
This paper presents a new effective Built-In Self Test (BIST) scheme that achieves 100% fault coverage with low area overhead, and without any modification of the circuit under tes...
Christophe Fagot, Olivier Gascuel, Patrick Girard,...
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
9 years 9 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
ISQED
2005
IEEE
116views Hardware» more  ISQED 2005»
9 years 9 months ago
A Mask Reuse Methodology for Reducing System-on-a-Chip Cost
Today's System-on-a-Chip (SoC) design methodology provides an efficient way to develop highly integrated systems on a single chip by utilizing pre-designed intellectual prope...
Subhrajit Bhattacharya, John A. Darringer, Daniel ...
INFOCOM
2005
IEEE
9 years 9 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
ICPR
2008
IEEE
9 years 10 months ago
A new spatial perceptual mask for image watermarking
This paper develops a new mask in the spatial domain for image watermarking. The mask exploits the properties of human visual system with respect to background luminance, the edge...
Xinshan Zhu
books