Sciweavers

1629 search results - page 162 / 326
» Infeasible Code Detection
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Detection of upper airway narrowing via classification of LPC coefficients: Implications for obstructive sleep apnea diagnosis
The similarities between unvoiced speech sounds and turbulent breath sounds were used to detect change in sound characteristics caused by narrowing of the upper airway (UA), simil...
Hisham Alshaer, Martha Garcia, M. Hossein Radfar, ...
EUROCON
2011
281views Hardware» more  EUROCON 2011»
14 years 1 months ago
Browsing videos by automatically detected audio events
—This paper focuses on Audio Event Detection (AED), a research area which aims to substantially enhance the access to audio in multimedia content. With the ever-growing quantity ...
Virginia Barbosa, Thomas Pellegrini, Miguel Bugalh...
ESSOS
2010
Springer
15 years 7 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
ICOST
2009
Springer
15 years 4 months ago
Pervasive Informatics and Persistent Actimetric Information in Health Smart Homes
This paper discuss the ability to obtain a reliable pervasive information at home from a network of localizing sensors allowing to follow the different locations at which a depend...
Yannick Fouquet, Nicolas Vuillerme, Jacques Demong...
96
Voted
ICASSP
2008
IEEE
15 years 4 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu