Sciweavers

1775 search results - page 75 / 355
» Antichains on Three Levels
Sort
View
ISCC
2002
IEEE
289views Communications» more  ISCC 2002»
15 years 2 months ago
Comparison of voice activity detection algorithms for VoIP
We discuss techniques for Voice Activity Detection (VAD) for Voice over Internet Protocol (VoIP). VAD aids in saving bandwidth requirement of a voice session thereby increasing th...
R. Venkatesha Prasad, Abhijeet Sangwan, H. S. Jama...
DATE
2000
IEEE
121views Hardware» more  DATE 2000»
15 years 2 months ago
Composite Signal Flow: A Computational Model Combining Events, Sampled Streams, and Vectors
The composite signal flow model of computation targets systems with significant control and data processing parts. It builds on the data flow and synchronous data flow models ...
Axel Jantsch, Per Bjuréus
APCHI
1998
IEEE
15 years 2 months ago
Cleogo: Collaborative and Multi-Metaphor Programming for Kids
Cleogo is a novel groupware environment that allows several users to simultaneously develop programs through any mixture of three alternative programming metaphors: a direct manip...
Andy Cockburn, Andrew Bryant
FAST
2010
15 years 5 days ago
I/O Deduplication: Utilizing Content Similarity to Improve I/O Performance
Duplication of data in storage systems is becoming increasingly common. We introduce I/O Deduplication, a storage optimization that utilizes content similarity for improving I/O p...
Ricardo Koller, Raju Rangaswami
EUROPAR
2008
Springer
14 years 11 months ago
Data Mining Algorithms on the Cell Broadband Engine
The Cell Broadband Engine (CBE) is a new heterogeneous multi-core processor from IBM, Sony and Toshiba, and provides the potential to achieve an impressive level of performance for...
Rubing Duan, Alfred Strey