Sciweavers

1717 search results - page 245 / 344
» Error concealment using a diffusion based method
Sort
View
ADHOCNOW
2008
Springer
14 years 11 months ago
An Energy-Efficient Query Aggregation Scheme for Wireless Sensor Networks
This paper presents a novel method for optimizing sliding window based continuous queries. We deal with two categories of aggregation operations: stepwise aggregation (e.g. COUNT) ...
Jun-Zhao Sun
INTERSPEECH
2010
14 years 4 months ago
Synthesis of fast speech with interpolation of adapted HSMMs and its evaluation by blind and sighted listeners
In this paper we evaluate a method for generating synthetic speech at high speaking rates based on the interpolation of hidden semi-Markov models (HSMMs) trained on speech data re...
Michael Pucher, Dietmar Schabus, Junichi Yamagishi
TSP
2010
14 years 4 months ago
Improved interference cancellation scheme for two-user detection of alamouti code
In this paper, we propose an improved interference cancellation method for two-user multiple access based MIMO communication system. It is shown in the paper, that by using the pr...
Manav R. Bhatnagar, Are Hjørungnes
BMCBI
2010
174views more  BMCBI 2010»
14 years 10 months ago
The effect of prior assumptions over the weights in BayesPI with application to study protein-DNA interactions from ChIP-based h
Background: To further understand the implementation of hyperparameters re-estimation technique in Bayesian hierarchical model, we added two more prior assumptions over the weight...
Junbai Wang
DAC
2002
ACM
15 years 11 months ago
Timed compiled-code simulation of embedded software for performance analysis of SOC design
In this paper, a new timing generation method is proposed for the performance analysis of embedded software. The time stamp generation of I/O accesses is crucial to performance es...
Jong-Yeol Lee, In-Cheol Park