Sciweavers

5339 search results - page 331 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Malicious data attack on real-time electricity market
Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Liyan Jia, Robert J. Thomas, Lang Tong
148
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Analysis of non-coherent code tracking for NPSK systems in presence of noise and fading
Given the recent interest in non-binary forms of spreading sequences, there is a gap in knowledge on code tracking techniques for noise-like spreading codes. This paper presents t...
Ramin Vali, Stevan M. Berber
119
Voted
ICASSP
2011
IEEE
14 years 8 months ago
An innovative RTP-based residential power scheduling scheme for smart grids
This paper proposes a Real-Time Pricing (RTP)-based power scheduling scheme as demand response for residential power usage. In this scheme, the Energy Management Controller (EMC) ...
Chen Chen, Shalinee Kishore, Lawrence V. Snyder
122
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Pitch transposition and breathiness modification using a glottal source model and its adapted vocal-tract filter
The transformation of the voiced segments of a speech recording has many applications such as expressivity synthesis or voice conversion. This paper addresses the pitch transposit...
Gilles Degottex, Axel Röbel, Xavier Rodet
ICASSP
2011
IEEE
14 years 8 months ago
Frequency domain compensation of spurious sidebands in A/D circuits
In a non-ideal PLL circuit, leakage of the reference signal into the control line produces spurious tones. When the distorted PLL signal is used as a clock signal, it creates spur...
Shang-Kee Ting, Ali H. Sayed