Sciweavers

96 search results - page 14 / 20
» Adaptation to New Microphones Using Tied-Mixture Normalizati...
Sort
View
SIAMCO
2011
14 years 4 months ago
Consistency of Sequential Bayesian Sampling Policies
We consider Bayesian information collection, in which a measurement policy collects information to support a future decision. This framework includes ranking and selection, continu...
Peter Frazier, Warren B. Powell
ACSW
2006
14 years 11 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
ICRA
2006
IEEE
114views Robotics» more  ICRA 2006»
15 years 3 months ago
Proxy-based Sliding Mode Control for Accurate and Safe Position Control
— High-gain PID position control, which is widely used with industrial robots, involves some risks in cases of abnormal events, such as unexpected environment contacts and tempor...
Ryo Kikuuwe, Hideo Fujimoto
ICANN
2007
Springer
15 years 1 months ago
Text-Independent Speaker Authentication with Spiking Neural Networks
This paper presents a novel system that performs text-independent speaker authentication using new spiking neural network (SNN) architectures. Each speaker is represented by a set ...
Simei Gomes Wysoski, Lubica Benuskova, Nikola Kasa...
DYNAMO
2000
110views more  DYNAMO 2000»
14 years 11 months ago
Machine-adaptable dynamic binary translation
Dynamic binary translation is the process of translating and optimizing executable code for one machine to another at runtime, while the program is "executing" on the ta...
David Ung, Cristina Cifuentes