Sciweavers

3898 search results - page 32 / 780
» On the Bit Extraction Problem
Sort
View
SPAA
2010
ACM
15 years 2 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
ISMIR
2005
Springer
137views Music» more  ISMIR 2005»
15 years 3 months ago
Extracting Quality Parameters for Compressed Audio from Fingerprints
An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of audio content. It can be used to identify audio, even when of severely dist...
Peter Jan O. Doets, Reginald L. Lagendijk
IJON
2006
64views more  IJON 2006»
14 years 9 months ago
Extraction of temporally correlated sources with its application to non-invasive fetal electrocardiogram extraction
This letter addresses the problem of fetal electrocardiogram (FECG) extraction. A class of source extraction algorithms is proposed, which uses a combination of two different appr...
Zhi-Lin Zhang, Zhang Yi
KDD
2004
ACM
163views Data Mining» more  KDD 2004»
15 years 10 months ago
Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods
We consider the problem of improving named entity recognition (NER) systems by using external dictionaries--more specifically, the problem of extending state-of-the-art NER system...
William W. Cohen, Sunita Sarawagi
IPL
2006
114views more  IPL 2006»
14 years 9 months ago
Quantum lower bounds for the Goldreich-Levin problem
At the heart of the Goldreich-Levin Theorem is the problem of determining an n-bit string a by making queries to two oracles, referred to as IP (inner product) and EQ (equivalence...
Mark Adcock, Richard Cleve, Kazuo Iwama, Raymond H...