Sciweavers

3373 search results - page 594 / 675
» Linear transformations on codes
Sort
View
TASLP
2010
137views more  TASLP 2010»
14 years 8 months ago
High-Pitch Formant Estimation by Exploiting Temporal Change of Pitch
—This paper considers the problem of obtaining an accurate spectral representation of speech formant structure when the voicing source exhibits a high fundamental frequency. Our ...
Tianyu T. Wang, Thomas F. Quatieri
SENSYS
2010
ACM
14 years 7 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
14 years 7 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
TC
2010
14 years 4 months ago
Model-Driven System Capacity Planning under Workload Burstiness
In this paper, we define and study a new class of capacity planning models called MAP queueing networks. MAP queueing networks provide the first analytical methodology to describe ...
Giuliano Casale, Ningfang Mi, Evgenia Smirni
EUROCRYPT
2012
Springer
13 years 8 days ago
Malleable Proof Systems and Applications
sion of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as Report 2012/012. Malleability ...
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya...