Sciweavers

628 search results - page 65 / 126
» Effectively Open Real Functions
Sort
View
ICASSP
2011
IEEE
14 years 7 months ago
Acoustic-to-articulatory inversion using an episodic memory
This paper presents a new acoustic-to-articulatory inversion methodbased on an episodic memory, which is an interesting model for two reasons. First, it does not rely on any assum...
Sébastien Demange, Slim Ouni
142
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Compensation of partly reliable components for band-limited speech recognition with missing data techniques
Mismatch in speech bandwidth between training and real operation greatly degrades the performance of automatic speech recognition (ASR) systems. Missing feature technique (MFT) is...
Yongjun He, Jiqing Han, Tieran Zheng, Guibin Zheng
ICALP
2010
Springer
15 years 8 months ago
Placing Regenerators in Optical Networks to Satisfy Multiple Sets of Requests
The placement of regenerators in optical networks has become an active area of research during the last years. Given a set of lightpaths in a network G and a positive integer d, re...
George B. Mertzios, Ignasi Sau, Mordechai Shalom, ...
VISUALIZATION
1994
IEEE
15 years 7 months ago
A Lattice Model for Data Display
We will try to address the need for a formal foundation for visualization by taking an analytic approach to defining D. Since an arbitrary function D: U V will not produce display...
William L. Hibbard, Charles R. Dyer, Brian E. Paul
CIKM
2005
Springer
15 years 9 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...