Sciweavers

24529 search results - page 4541 / 4906
» Computing on Authenticated Data
Sort
View
152
Voted
TOCHI
1998
112views more  TOCHI 1998»
15 years 4 months ago
The Integrality of Speech in Multimodal Interfaces
A framework of complementary behavior has been proposed which maintains that direct manipulation and speech interfaces have reciprocal strengths and weaknesses. This suggests that...
Michael A. Grasso, David S. Ebert, Timothy W. Fini...
TODAES
1998
68views more  TODAES 1998»
15 years 4 months ago
Specification and verification of pipelining in the ARM2 RISC microprocessor
Abstract State Machines (ASMs) provide a sound mathematical basis for the specification and verification of systems. An application of the ASM methodology to the verification of a ...
James K. Huggins, David Van Campenhout
TASLP
2002
84views more  TASLP 2002»
15 years 4 months ago
Maximum likelihood multiple subspace projections for hidden Markov models
The first stage in many pattern recognition tasks is to generate a good set of features from the observed data. Usually, only a single feature space is used. However, in some compl...
Mark J. F. Gales
TCAD
2002
115views more  TCAD 2002»
15 years 4 months ago
Analytical models for crosstalk excitation and propagation in VLSI circuits
We develop a general methodology to analyze crosstalk effects that are likely to cause errors in deep submicron high speed circuits. We focus on crosstalk due to capacitive coupli...
Wei-Yu Chen, Sandeep K. Gupta, Melvin A. Breuer
TCSV
2002
78views more  TCSV 2002»
15 years 4 months ago
Local bandwidth constrained fast inverse motion compensation for DCT-domain video transcoding
DCT-based digital video coding standards such as MPEG and H.26x are becoming more widely adopted for multimedia applications. Since the standards differ in their format and syntax...
Shizhong Liu, Alan C. Bovik
« Prev « First page 4541 / 4906 Last » Next »