Sciweavers

ICASSP
2009
IEEE
15 years 8 months ago
Multidimensional signal reconstruction from multichannel acquisition
We provide an analysis of the algorithms necessary for the optimal use of multidimensional signal reconstruction from multichannel acquisition. Firstly, we provide computable cond...
Ka Lung Law, Robert M. Fossum, Minh N. Do
ICISS
2007
Springer
15 years 8 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
ICASSP
2009
IEEE
15 years 8 months ago
Spoken dialog strategy based on understanding graph search
We regarded information retrieval as a graph search problem and proposed several novel dialog strategies that can recover from misrecognition through a spoken dialog that traverse...
Yuji Kinoshita, Chiyomi Miyajima, Norihide Kitaoka...
ICASSP
2009
IEEE
15 years 8 months ago
Joint estimation of short-term and long-term predictors in speech coders
In low bit-rate coders, the near-sample and far-sample redundancies of the speech signal are usually removed by a cascade of a shortterm and a long-term linear predictor. These tw...
Daniele Giacobello, Mads Græsbøll Chr...
ICASSP
2009
IEEE
15 years 8 months ago
Optimized opportunistic multicast scheduling (OMS) over heterogeneous cellular networks
Optimized opportunistic multicast scheduling (OMS) has been studied previously by the authors for homogeneous cellular networks, where the problem of efficiently transmitting a co...
Tze-Ping Low, Man-On Pun, Yao-Win Peter Hong, C.-C...