Sciweavers

546 search results - page 66 / 110
» Extended Null-Move Reductions
Sort
View
TMC
2011
203views more  TMC 2011»
14 years 4 months ago
Throughput Optimization in Mobile Backbone Networks
—This paper describes new algorithms for throughput optimization in a mobile backbone network. This hierarchical communication framework combines mobile backbone nodes, which hav...
Emily M. Craparo, Jonathan P. How, Eytan Modiano
INTERSPEECH
2010
14 years 4 months ago
Boosted mixture learning of Gaussian mixture HMMs for speech recognition
In this paper, we propose a novel boosted mixture learning (BML) framework for Gaussian mixture HMMs in speech recognition. BML is an incremental method to learn mixture models fo...
Jun Du, Yu Hu, Hui Jiang
TSP
2010
14 years 4 months ago
Covariance estimation in decomposable Gaussian graphical models
Graphical models are a framework for representing and exploiting prior conditional independence structures within distributions using graphs. In the Gaussian case, these models are...
Ami Wiesel, Yonina C. Eldar, Alfred O. Hero
ICASSP
2011
IEEE
14 years 1 months ago
Multi image super resolution using compressed sensing
In this paper we present a new compressed sensing model and reconstruction method for multi-detector signal acquisition. We extend the concept of the famous single-pixel camera to...
Torsten Edeler, Kevin Ohliger, Stephan Hussmann, A...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 1 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal