Sciweavers

285 search results - page 51 / 57
» Performance and Functional Verification of Microprocessors
Sort
View
EMNETS
2007
15 years 1 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
14 years 11 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
79
Voted
COMCOM
2006
87views more  COMCOM 2006»
14 years 9 months ago
Practical utilities for monitoring multicast service availability
Monitoring has become one of the key issues for the successful deployment of IP multicast in the Internet. During the last decade, several tools and systems have been developed to ...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...
89
Voted
TASLP
2002
93views more  TASLP 2002»
14 years 9 months ago
Robust endpoint detection and energy normalization for real-time speech and speaker recognition
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to th...
Qi Li, Jinsong Zheng, A. Tsai, Qiru Zhou
76
Voted
CODES
2010
IEEE
14 years 7 months ago
Improving platform-based system synthesis by satisfiability modulo theories solving
Due to the ever increasing system complexity, deciding whether a given platform is sufficient to implement a set of applications under given constraints becomes a serious bottlene...
Felix Reimann, Michael Glaß, Christian Haube...