Sciweavers

1747 search results - page 272 / 350
» Long Range Dependence
Sort
View
RC
2002
72views more  RC 2002»
14 years 11 months ago
Symbolic Preconditioning with Taylor Models: Some Examples
Deterministic global optimization with interval analysis involves - using interval enclosures for ranges of the constraints, objective, and gradient to reject infeasible regions, r...
R. Baker Kearfott, G. William Walster
TASLP
2002
82views more  TASLP 2002»
14 years 11 months ago
Graceful degradation of speech recognition performance over packet-erasure networks
Abstract--This paper explores packet loss recovery for automatic speech recognition (ASR) in spoken dialog systems, assuming an architecture in which a lightweight client communica...
Constantinos Boulis, Mari Ostendorf, Eve A. Riskin...
PRL
2007
160views more  PRL 2007»
14 years 11 months ago
A 3D face and hand biometric system for robust user-friendly authentication
A complete authentication system based on fusion of 3D face and hand biometrics is presented and evaluated in this paper. The system relies on a low cost real-time sensor, which c...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
SAC
2008
ACM
14 years 11 months ago
Automatic software fault localization using generic program invariants
Despite extensive testing in the development phase, residual defects can be a great threat to dependability in the operational phase. This paper studies the utility of lowcost, ge...
Rui Abreu, Alberto González 0002, Peter Zoe...
CORR
2008
Springer
130views Education» more  CORR 2008»
14 years 10 months ago
Spectrum Allocation in Two-Tier Networks
Abstract-- Two-tier networks, comprising a conventional cellular network overlaid with shorter range hotspots (e.g. femtocells, distributed antennas, or wired relays), offer an eco...
Vikram Chandrasekhar, Jeffrey G. Andrews