Sciweavers

1548 search results - page 278 / 310
» Estimating Software Vulnerabilities
Sort
View
ERSA
2009
149views Hardware» more  ERSA 2009»
14 years 7 months ago
Hardware-Optimized Ziggurat Algorithm for High-Speed Gaussian Random Number Generators
Many scientific and engineering applications, which are increasingly being ported from software to reconfigurable platforms, require Gaussian-distributed random numbers. Thus, the...
Hassan Edrees, Brian Cheung, McCullen Sandora, Dav...
114
Voted
IESS
2009
Springer
182views Hardware» more  IESS 2009»
14 years 7 months ago
Modeling Cache Effects at the Transaction Level
Abstract. Embedded system design complexities are growing exponentially. Demand has increased for modeling techniques that can provide both accurate measurements of delay and fast ...
Ardavan Pedram, David Craven, Andreas Gerstlauer
CMPB
2010
171views more  CMPB 2010»
14 years 4 months ago
Metabolica: A statistical research tool for analyzing metabolic networks
Steady state flux balance analysis (FBA) for cellular metabolism is used, e.g., to seek information on the activity of the different pathways under equilibrium conditions, or as a...
Jenni Heino, Daniela Calvetti, Erkki Somersalo
TASLP
2010
142views more  TASLP 2010»
14 years 4 months ago
Beyond the Narrowband Approximation: Wideband Convex Methods for Under-Determined Reverberant Audio Source Separation
We consider the problem of extracting the source signals from an under-determined convolutive mixture assuming known mixing filters. State-of-the-art methods operate in the time-fr...
M. Kowalski, Emmanuel Vincent, Rémi Gribonv...
TASLP
2010
82views more  TASLP 2010»
14 years 4 months ago
Psychoacoustically Constrained and Distortion Minimized Speech Enhancement
Abstract--This paper considers a psychoacoustically constrained and distortion minimized speech enhancement algorithm. Noise reduction, in general, leads to speech distortion, and ...
Seokhwan Jo, Chang D. Yoo