Sciweavers

1722 search results - page 263 / 345
» Dedication
Sort
View
ICASSP
2011
IEEE
14 years 4 months ago
Investigations into the incorporation of the Ideal Binary Mask in ASR
While much work has been dedicated to exploring how best to incorporate the Ideal Binary Mask (IBM) in automatic speech recognition (ASR) for noisy signals, we demonstrate that th...
William Hartmann, Eric Fosler-Lussier
101
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Dart - a high level software-defined radio platform model for developing the run-time controller
Novel cognitive radio platforms such as IMECs COgnitive Baseband RAdio (COBRA) should ensure the feasibility of multiple streams and their reconfigurability and scalability durin...
Martin Palkovic, Jeroen Declerck, Praveen Raghavan...
123
Voted
ISBI
2011
IEEE
14 years 4 months ago
Interventional MR-imaging for thermal ablation therapy
Magnetic Resonance Imaging (MRI) has several unique advantages for guiding thermal ablation therapies. It not only provides excellent soft-tissue contrast and multiplanar capabili...
Eva Rothgang, Wesley D. Gilson, Wilhelm Strehl, Li...
104
Voted
ISCA
2011
IEEE
229views Hardware» more  ISCA 2011»
14 years 4 months ago
TLSync: support for multiple fast barriers using on-chip transmission lines
As the number of cores on a single-chip grows, scalable barrier synchronization becomes increasingly difficult to implement. In software implementations, such as the tournament ba...
Jungju Oh, Milos Prvulovic, Alenka G. Zajic
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 4 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid