Sciweavers

4429 search results - page 708 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
TASLP
2008
100views more  TASLP 2008»
14 years 9 months ago
Noise Tracking Using DFT Domain Subspace Decompositions
All discrete Fourier transform (DFT) domain-based speech enhancement gain functions rely on knowledge of the noise power spectral density (PSD). Since the noise PSD is unknown in a...
Richard C. Hendriks, Jesper Jensen, Richard Heusde...
PERCOM
2010
ACM
14 years 8 months ago
Connectivity monitoring in wireless sensor networks
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network conn...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
CIKM
2009
Springer
14 years 8 months ago
Diverging patterns: discovering significant frequency change dissimilarities in large databases
In this paper, we present a framework for mining diverging patterns, a new type of contrast patterns whose frequency changes significantly differently in two data sets, e.g., it c...
Aijun An, Qian Wan, Jiashu Zhao, Xiangji Huang
CDC
2010
IEEE
105views Control Systems» more  CDC 2010»
14 years 5 months ago
Universal scheduling for networks with arbitrary traffic, channels, and mobility
We extend stochastic network optimization theory to treat networks with arbitrary sample paths for arrivals, channels, and mobility. The network can experience unexpected link or n...
Michael J. Neely
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 5 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi