Sciweavers

712 search results - page 74 / 143
» Effective, Automatic Procedure Extraction
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
A robust quantization method using a robust Chinese remainder theorem for secret key generation
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authoriz...
Wenjie Wang, Chen Wang, Xiang-Gen Xia
ICASSP
2011
IEEE
14 years 1 months ago
On 2D localization of reflectors using robust beamforming techniques
This paper presents a method for the localization of reflectors in an acoustic environment, using robust beamforming techniques and a cylindrical microphone array, for which an i...
Edwin Mabande, Haohai Sun, Konrad Kowalczyk, Walte...
ICIAP
2003
ACM
15 years 10 months ago
A real-time text-independent speaker identification system
The paper presents a real-time speaker identification system based on the analysis of the audio track of a video stream. The system has been employed in the context of automatic v...
Luigi P. Cordella, Pasquale Foggia, Carlo Sansone,...
BILDMED
2008
123views Algorithms» more  BILDMED 2008»
14 years 11 months ago
Flow Quantification from 2D Phase Contrast MRI in Renal Arteries Using Clustering
Abstract. We present an approach based on clustering to segment renal arteries from 2D PC Cine MR images to measure blood velocity and flow. Such information are important in gradi...
Frank Zöllner, Jan Ankar Monnsen, Arvid Lunde...
EMNLP
2006
14 years 11 months ago
Detecting Parser Errors Using Web-based Semantic Filters
NLP systems for tasks such as question answering and information extraction typically rely on statistical parsers. But the efficacy of such parsers can be surprisingly low, partic...
Alexander Yates, Stefan Schoenmackers, Oren Etzion...