Sciweavers

2932 search results - page 415 / 587
» Higher order mining
Sort
View
BIBE
2008
IEEE
137views Bioinformatics» more  BIBE 2008»
15 years 7 months ago
A sparse variational Bayesian approach for fMRI data analysis
— The aim of this work is to propose a new approach for the determination of the design matrix in fMRI experiments. The design matrix embodies all available knowledge about exper...
Vangelis P. Oikonomou, Evanthia E. Tripoliti, Dimi...
CISS
2008
IEEE
15 years 7 months ago
The Chinese Generals Problem
Abstract—To achieve higher reliability, safety, and faulttolerance, many mission-critical detection and decision systems implement consensus algorithms that force the systems’ ...
Edwin Soedarmadji
DIGITEL
2008
IEEE
15 years 7 months ago
Using Posting Templates for Enhancing Students' Argumentative Elaborations in Learning Villages
Learning Villages (LV) is a game-based computersupported collaborative learning (CSCL) platform, which facilitates students’ issue-based discussion in a massively multiplayer ga...
Morris Siu Yung Jong, Alex W. C. Tse, Yuxia Zhou, ...
89
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Nonlinear residual acoustic echo suppression for high levels of harmonic distortion
Linear adaptive filters are often used for Acoustic Echo Cancellation (AEC) but sometimes fail to perform well in notebook computers and inexpensive telephony devices. Low-qualit...
Diego A. Bendersky, Jack W. Stokes, Henrique S. Ma...
ICASSP
2008
IEEE
15 years 7 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...