Sciweavers

797 search results - page 74 / 160
» Observing Success in the Pi-Calculus
Sort
View
ISCAS
2008
IEEE
139views Hardware» more  ISCAS 2008»
15 years 4 months ago
Missing feature speech recognition in a meeting situation with maximum SNR beamforming
Abstract— Especially for tasks like automatic meeting transcription, it would be useful to automatically recognize speech also while multiple speakers are talking simultaneously....
Dorothea Kolossa, Shoko Araki, Marc Delcroix, Tomo...
VTC
2008
IEEE
185views Communications» more  VTC 2008»
15 years 4 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
AINA
2007
IEEE
15 years 4 months ago
VIP: a Virtual Interface-based aPproach for vertical handover in single-subnet networks
We propose a simple and practical solution, called the Virtual Interface-based aPproach (VIP), for seamless vertical handover in single-subnet networks. VIP combines a virtual int...
Wei-Cheng Xiao, Shih-Hsuan Tang, Cheng-Fu Chou
CEC
2007
IEEE
15 years 4 months ago
Evolvability and Redundancy in Shared Grammar Evolution
— Shared grammar evolution (SGE) is a novel scheme for representing and evolving a population of variablelength programs as a shared set of grammatical productions. Productions t...
Martin H. Luerssen, David M. W. Powers
CODES
2007
IEEE
15 years 4 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...