Sciweavers

3373 search results - page 370 / 675
» Linear transformations on codes
Sort
View
INTERSPEECH
2010
14 years 10 months ago
Regularized-MLLR speaker adaptation for computer-assisted language learning system
In this paper, we propose a novel speaker adaptation technique, regularized-MLLR, for Computer Assisted Language Learning (CALL) systems. This method uses a linear combination of ...
Dean Luo, Yu Qiao, Nobuaki Minematsu, Yutaka Yamau...
AP2PS
2009
IEEE
15 years 7 months ago
Algorithm-Based Fault Tolerance Applied to P2P Computing Networks
—P2P computing platforms are subject to a wide range of attacks. In this paper, we propose a generalisation of the previous disk-less checkpointing approach for fault-tolerance i...
Thomas Roche, Mathieu Cunche, Jean-Louis Roch
CRYPTO
2011
Springer
179views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Smaller Decoding Exponents: Ball-Collision Decoding
Very few public-key cryptosystems are known that can encrypt and decrypt in time b2+o(1) with conjectured security level 2b against conventional computers and quantum computers. Th...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...
EUROSYS
2008
ACM
16 years 1 months ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
ICSE
2007
IEEE-ACM
16 years 4 months ago
Automated Inference of Pointcuts in Aspect-Oriented Refactoring
Software refactoring is the process of reorganizing the internal structure of code while preserving the external behavior. Aspect-Oriented Programming (AOP) provides new modulariz...
Prasanth Anbalagan, Tao Xie