Sciweavers

1717 search results - page 116 / 344
» Error concealment using a diffusion based method
Sort
View
PVM
2007
Springer
15 years 9 months ago
Practical Model-Checking Method for Verifying Correctness of MPI Programs
Formal program verification often requires creating a model of the program and running it through a model-checking tool. However, this model-creation step is itself error prone, t...
Salman Pervez, Ganesh Gopalakrishnan, Robert M. Ki...
ICASSP
2011
IEEE
14 years 6 months ago
Pronunciation variation modeling of non-native proper names by discriminative tree search
In this paper, the task of selecting the optimal subset of pronunciation variants from a set of automatically generated candidates is recast as a tree search problem. In this appr...
Line Adde, Torbjørn Svendsen
CSDA
2006
98views more  CSDA 2006»
15 years 2 months ago
Frequency estimation of undamped exponential signals using genetic algorithms
: In this paper, we consider the problem of frequency estimation of undamped superimposed exponential signals model. We propose two iterative techniques of frequency estimation usi...
Amit Mitra, Debasis Kundu, Gunjan Agrawal
BMCBI
2006
100views more  BMCBI 2006»
15 years 2 months ago
Using the nucleotide substitution rate matrix to detect horizontal gene transfer
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Micah Hamady, M. D. Betterton, Rob Knight
DFT
2003
IEEE
100views VLSI» more  DFT 2003»
15 years 8 months ago
Scan-Based BIST Diagnosis Using an Embedded Processor
For system-on-chip designs that contain an embedded processor, this paper present a software based diagnosis scheme that can make use of the processor to aid in diagnosis in a sca...
Kedarnath J. Balakrishnan, Nur A. Touba