Sciweavers

2131 search results - page 323 / 427
» Immunity for Closed Sets
Sort
View
TON
2010
192views more  TON 2010»
14 years 6 months ago
Delay analysis for wireless networks with single hop traffic and general interference constraints
We consider a class of wireless networks with general interference constraints on the set of links that can be served simultaneously at any given time. We restrict the traffic to b...
Gagan Raj Gupta, Ness B. Shroff
ICASSP
2011
IEEE
14 years 3 months ago
Co-clustering as multilinear decomposition with sparse latent factors
The K-means clustering problem seeks to partition the columns of a data matrix in subsets, such that columns in the same subset are ‘close’ to each other. The co-clustering pr...
Evangelos E. Papalexakis, Nicholas D. Sidiropoulos
ICASSP
2011
IEEE
14 years 3 months ago
Sound morphing by feature interpolation
The goal of sound morphing by feature interpolation is to obtain sounds whose values of features are intermediate between those of the source and target sounds. In order to do thi...
Marcelo F. Caetano, Xavier Rodet
ICASSP
2011
IEEE
14 years 3 months ago
SVM feature selection for multidimensional EEG data
In many machine learning applications, like Brain - Computer Interfaces (BCI), only high-dimensional noisy data are available rendering the discrimination task non-trivial. In thi...
Nisrine Jrad, Ronald Phlypo, Marco Congedo
ICASSP
2011
IEEE
14 years 3 months ago
A frame mapping based HMM approach to cross-lingual voice transformation
Cross-lingual voice transformation is challenging when source language (L1) and target language (L2) are very different in corresponding phonetics and prosodies. We propose a fram...
Yao Qian, Ji Xu, Frank K. Soong