Sciweavers

3785 search results - page 743 / 757
» Immune System Based Intrusion Detection System
Sort
View
87
Voted
SPEECH
2008
97views more  SPEECH 2008»
14 years 11 months ago
A new approach for the adaptation of HMMs to reverberation and background noise
Looking at practical application scenarios of speech recognition systems several distortion effects exist that have a major influence on the speech signal and can considerably det...
Hans-Günter Hirsch, Harald Finster
103
Voted
RV
2010
Springer
177views Hardware» more  RV 2010»
14 years 10 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
14 years 9 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
99
Voted
ASPDAC
2011
ACM
167views Hardware» more  ASPDAC 2011»
14 years 3 months ago
Variation-tolerant and self-repair design methodology for low temperature polycrystalline silicon liquid crystal and organic lig
- In low temperature polycrystalline silicon (LTPS) based display technologies, the electrical parameter variations in thin film transistors (TFTs) caused by random grain boundarie...
Chih-Hsiang Ho, Chao Lu, Debabrata Mohapatra, Kaus...
BMCBI
2011
14 years 3 months ago
PRIN, a predicted rice interactome network
Background: Protein-protein interactions play a fundamental role in elucidating the molecular mechanisms of biomolecular function, signal transductions and metabolic pathways of l...
Haibin Gu, Pengcheng Zhu, Yinming Jiao, Yijun Meng...