Sciweavers

1717 search results - page 245 / 344
» Error concealment using a diffusion based method
Sort
View
155
Voted
ADHOCNOW
2008
Springer
15 years 3 months ago
An Energy-Efficient Query Aggregation Scheme for Wireless Sensor Networks
This paper presents a novel method for optimizing sliding window based continuous queries. We deal with two categories of aggregation operations: stepwise aggregation (e.g. COUNT) ...
Jun-Zhao Sun
129
Voted
INTERSPEECH
2010
14 years 9 months ago
Synthesis of fast speech with interpolation of adapted HSMMs and its evaluation by blind and sighted listeners
In this paper we evaluate a method for generating synthetic speech at high speaking rates based on the interpolation of hidden semi-Markov models (HSMMs) trained on speech data re...
Michael Pucher, Dietmar Schabus, Junichi Yamagishi
129
Voted
TSP
2010
14 years 9 months ago
Improved interference cancellation scheme for two-user detection of alamouti code
In this paper, we propose an improved interference cancellation method for two-user multiple access based MIMO communication system. It is shown in the paper, that by using the pr...
Manav R. Bhatnagar, Are Hjørungnes
142
Voted
BMCBI
2010
174views more  BMCBI 2010»
15 years 2 months ago
The effect of prior assumptions over the weights in BayesPI with application to study protein-DNA interactions from ChIP-based h
Background: To further understand the implementation of hyperparameters re-estimation technique in Bayesian hierarchical model, we added two more prior assumptions over the weight...
Junbai Wang
112
Voted
DAC
2002
ACM
16 years 3 months ago
Timed compiled-code simulation of embedded software for performance analysis of SOC design
In this paper, a new timing generation method is proposed for the performance analysis of embedded software. The time stamp generation of I/O accesses is crucial to performance es...
Jong-Yeol Lee, In-Cheol Park