Sciweavers

6318 search results - page 1195 / 1264
» Data Leakage Detection
Sort
View
SPEECH
2008
97views more  SPEECH 2008»
15 years 1 months ago
A new approach for the adaptation of HMMs to reverberation and background noise
Looking at practical application scenarios of speech recognition systems several distortion effects exist that have a major influence on the speech signal and can considerably det...
Hans-Günter Hirsch, Harald Finster
TCOM
2008
80views more  TCOM 2008»
15 years 1 months ago
Power reduction techniques for multiple-subcarrier modulated diffuse wireless optical channels
In this paper, two novel techniques are proposed to reduce the average optical power in wireless optical multiplesubcarrier modulated (MSM) systems, namely in-band trellis coding a...
Weiwei Kang, Steve Hranilovic
TIFS
2008
129views more  TIFS 2008»
15 years 1 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
120
Voted
BMCBI
2005
92views more  BMCBI 2005»
15 years 1 months ago
FIGENIX: Intelligent automation of genomic annotation: expertise integration in a new software platform
Background: Two of the main objectives of the genomic and post-genomic era are to structurally and functionally annotate genomes which consists of detecting genes' position a...
Philippe Gouret, Vérane Vitiello, Nathalie ...
TKDE
2008
125views more  TKDE 2008»
15 years 1 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
« Prev « First page 1195 / 1264 Last » Next »