Sciweavers

2421 search results - page 192 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
118
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Hierarchical language modeling for audio events detection in a sports game
We investigate the automatic labelling of “events” from an audio recording of a sports game. We describe a technique that utilises a hierarchy of language models, which are a ...
Qiang Huang, Stephen Cox
108
Voted
ACISICIS
2007
IEEE
15 years 10 months ago
Nanorobots for Laparoscopic Cancer Surgery
This paper presents an innovative hardware architecture for medical nanorobots, using nanobioelectronics, clinical data, and wireless technologies, as embedded integrated system d...
Adriano Cavalcanti, Bijan Shirinzadeh, Declan Murp...
120
Voted
KBSE
2005
IEEE
15 years 9 months ago
Locating faulty code using failure-inducing chops
Software debugging is the process of locating and correcting faulty code. Prior techniques to locate faulty code either use program analysis techniques such as backward dynamic pr...
Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gup...
160
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Maximizing the Contact Opportunity for Vehicular Internet Access
Abstract—With increasing popularity of media enabled handhelds, the need for high data-rate services for mobile users is evident. Large-scale Wireless LANs (WLANs) can provide su...
Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kum...
122
Voted
IPSN
2003
Springer
15 years 8 months ago
Hypothesis Testing over Factorizations for Data Association
Abstract. The issue of data association arises frequently in sensor networks; whenever multiple sensors and sources are present, it may be necessary to determine which observations...
Alexander T. Ihler, John W. Fisher III, Alan S. Wi...