Sciweavers

42507 search results - page 8442 / 8502
» On the analysis of
Sort
View
SOCIALCOM
2010
14 years 6 months ago
Learning Influence Propagation of Personal Blogs with Content and Network Analyses
Weblogs (blogs) serve as a gateway to a large blog reader population, so blog authors can potentially influence a large reader population by expressing their thoughts and expertise...
Il-Chul Moon, Dongwoo Kim, Yohan Jo, Alice H. Oh
SOICT
2010
14 years 6 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
TASE
2010
IEEE
14 years 6 months ago
Analytic Calculus of Response Time in Networked Automation Systems
--This paper presents a novel approach to evaluate the response time in networked automation systems (NAS) that use a client/server protocol. The developments introduced are derive...
Boussad Addad, Said Amari, Jean-Jacques Lesage
TASLP
2010
117views more  TASLP 2010»
14 years 6 months ago
Speech Enhancement Using Gaussian Scale Mixture Models
This paper presents a novel probabilistic approach to speech enhancement. Instead of a deterministic logarithmic relationship, we assume a probabilistic relationship between the fr...
Jiucang Hao, Te-Won Lee, Terrence J. Sejnowski
TASLP
2010
167views more  TASLP 2010»
14 years 6 months ago
Broadband Source Localization From an Eigenanalysis Perspective
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...
Mehrez Souden, Jacob Benesty, Sofiène Affes
« Prev « First page 8442 / 8502 Last » Next »