Sciweavers

2826 search results - page 159 / 566
» A resource-based analysis of IT sourcing
Sort
View
CJ
2010
132views more  CJ 2010»
14 years 11 months ago
Internet Failures: an Emergent Sea of Complex Systems and Critical Design Errors?
Complex systems researchers have looked to the Internet as a possible source of interesting emergent behaviour. Indeed, some high profile failures, and some low level phenomena, m...
Jon Crowcroft
ICASSP
2011
IEEE
14 years 5 months ago
Cross-Channel Spectral Subtraction for meeting speech recognition
We propose Cross-Channel Spectral Subtraction (CCSS), a source separation method for recognizing meeting speech where one microphone is prepared for each speaker. The method quick...
Yu Nasu, Koichi Shinoda, Sadaoki Furui
ICASSP
2011
IEEE
14 years 5 months ago
On 2D localization of reflectors using robust beamforming techniques
This paper presents a method for the localization of reflectors in an acoustic environment, using robust beamforming techniques and a cylindrical microphone array, for which an i...
Edwin Mabande, Haohai Sun, Konrad Kowalczyk, Walte...
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 2 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
135
Voted
ASMTA
2008
Springer
200views Mathematics» more  ASMTA 2008»
15 years 3 months ago
Bottleneck Analysis for Two-Hop IEEE 802.11e Ad Hoc Networks
Recently, a quality-of-service (QoS) extension of the IEEE 802.11 standard (known as IEEE 802.11e) for wireless LANs has been proposed. We present a versatile and accurate performa...
Anne Remke, Boudewijn R. Haverkort, Geert J. Heije...