Sciweavers

1124 search results - page 178 / 225
» Hidden Market Design
Sort
View
ISI
2005
Springer
15 years 5 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
MM
2004
ACM
117views Multimedia» more  MM 2004»
15 years 5 months ago
Singing voice detection in popular music
We propose a novel technique for the automatic classification of vocal and non-vocal regions in an acoustic musical signal. Our technique uses a combination of harmonic content a...
Tin Lay Nwe, Arun Shenoy, Ye Wang
MSWIM
2004
ACM
15 years 5 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
SENSYS
2004
ACM
15 years 5 months ago
MNP: multihop network reprogramming service for sensor networks
Reprogramming of sensor networks is an important and challenging problem as it is often necessary to reprogram the sensors in place. In this paper, we propose a multihop reprogram...
Limin Wang
ICMI
2004
Springer
159views Biometrics» more  ICMI 2004»
15 years 4 months ago
A segment-based audio-visual speech recognizer: data collection, development, and initial experiments
This paper presents the development and evaluation of a speaker-independent audio-visual speech recognition (AVSR) system that utilizes a segment-based modeling strategy. To suppo...
Timothy J. Hazen, Kate Saenko, Chia-Hao La, James ...