Sciweavers

1686 search results - page 306 / 338
» Higher Order Deforestation
Sort
View
EFORENSICS
2009
Springer
15 years 4 months ago
Vocal Forgery in Forensic Sciences
Abstract. This article describes techniques of vocal forgery able to affect automatic speaker recognition system in a forensic context. Vocal forgery covers two main aspects: voice...
Patrick Perrot, Mathieu Morel, Joseph Razik, G&eac...
DOCENG
2009
ACM
15 years 4 months ago
Web document text and images extraction using DOM analysis and natural language processing
: © Web Document Text and Images Extraction using DOM Analysis and Natural Language Processing Parag Mulendra Joshi, Sam Liu HP Laboratories HPL-2009-187 Web page text extraction,...
Parag Mulendra Joshi, Sam Liu
ICUIMC
2009
ACM
15 years 4 months ago
Proposal and evaluation of multiple gateways distribution method for wireless mesh network
Researches on the wireless mesh network in which access points (APs) of a wireless LAN are connected by an ad-hoc networks are recently drawing much attention. In the wireless mes...
Masashi Ito, Toshihiro Shikama, Akira Watanabe
SIGMETRICS
2009
ACM
134views Hardware» more  SIGMETRICS 2009»
15 years 4 months ago
DRAM errors in the wild: a large-scale field study
Errors in dynamic random access memory (DRAM) are a common form of hardware failure in modern compute clusters. Failures are costly both in terms of hardware replacement costs and...
Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich ...
ICC
2008
IEEE
141views Communications» more  ICC 2008»
15 years 4 months ago
Multilevel Structured Low-Density Parity-Check Codes
— Low-Density Parity-Check (LDPC) codes are typically characterized by a relatively high-complexity description, since a considerable amount of memory is required in order to sto...
Nicholas Bonello, Sheng Chen, Lajos Hanzo