Sciweavers

6770 search results - page 435 / 1354
» How GPUs Work
Sort
View
128
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Name-aware speech recognition for interactive question answering
In this work we show how interactivity in a voice-enabled question answering application may improve speech recognition. We allow the user to provide a target named entity before ...
Svetlana Stoyanchev, Gökhan Tür, Dilek Z...
ICC
2008
IEEE
128views Communications» more  ICC 2008»
15 years 11 months ago
Quality-of-Service Routing with Two Concave Constraints
—Routing is a process of finding a network path from a source node to a destination node. A good routing protocol should find the “best path” from a source to a destination...
Ka-Chung Leung, King-Shan Lui, Ka-Cheong Leung, Fr...
ICC
2008
IEEE
123views Communications» more  ICC 2008»
15 years 11 months ago
Providing End-to-End Connectivity to SIP User Agents Behind NATs
— The widespread diffusion of private networks in SOHO scenarios is fostering an increased deployment of Network Address Translators (NATs). The presence of NATs seriously limits...
Mario Baldi, Luca De Marco, Fulvio Risso, Livio To...
ICDM
2008
IEEE
175views Data Mining» more  ICDM 2008»
15 years 11 months ago
Overlapping Matrix Pattern Visualization: A Hypergraph Approach
In this work, we study a visual data mining problem: Given a set of discovered overlapping submatrices of interest, how can we order the rows and columns of the data matrix to bes...
Ruoming Jin, Yang Xiang, David Fuhry, Feodor F. Dr...
ICDM
2008
IEEE
155views Data Mining» more  ICDM 2008»
15 years 11 months ago
Alert Detection in System Logs
We present Nodeinfo, an unsupervised algorithm for anomaly detection in system logs. We demonstrate Nodeinfo’s effectiveness on data from four of the world’s most powerful sup...
Adam J. Oliner, Alex Aiken, Jon Stearley