Sciweavers

1566 search results - page 152 / 314
» Contification Using Dominators
Sort
View
INTERSPEECH
2010
14 years 4 months ago
A new binary mask based on noise constraints for improved speech intelligibility
It has been shown that large gains in speech intelligibility can be obtained by using the binary mask approach which retains the time-frequency (T-F) units of the mixture signal t...
Gibak Kim, Philipos C. Loizou
JDCTA
2010
148views more  JDCTA 2010»
14 years 4 months ago
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
Yao Rong, Jiandong Wang
MEMICS
2010
14 years 4 months ago
Monitoring and Control of Temperature in Networks-on-Chip
Abstract. Increasing integration densities and the emergence of nanotechnology cause issues related to reliability and power consumption to become dominant factors for the design o...
Tim Wegner, Claas Cornelius, Andreas Tockhorn, Dir...
TIT
2010
150views Education» more  TIT 2010»
14 years 4 months ago
Information-theoretic key agreement of multiple terminals: part I
This is the first part of a two-part paper on information-theoretically secure secret key agreement. In this part, we study the secrecy problem under the widely studied source mod...
Amin Aminzadeh Gohari, Venkat Anantharam
TIT
2010
103views Education» more  TIT 2010»
14 years 4 months ago
Analysis of absorbing sets and fully absorbing sets of array-based LDPC codes
The class of low-density parity-check (LDPC) codes is attractive, since such codes can be decoded using practical message-passing algorithms, and their performance is known to app...
Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Ma...