Sciweavers

1036 search results - page 187 / 208
» Report on INEX 2009
Sort
View
80
Voted
ICASSP
2009
IEEE
15 years 4 months ago
Cross-lingual speech recognition under runtime resource constraints
This paper proposes and compares four cross-lingual and bilingual automatic speech recognition techniques under the constraints of limited memory size and CPU speed. The first thr...
Dong Yu, Li Deng, Peng Liu, Jian Wu, Yifan Gong, A...
SASP
2009
IEEE
291views Hardware» more  SASP 2009»
15 years 4 months ago
A parameterisable and scalable Smith-Waterman algorithm implementation on CUDA-compatible GPUs
—This paper describes a multi-threaded parallel design and implementation of the Smith-Waterman (SM) algorithm on compute unified device architecture (CUDA)-compatible graphic pr...
Cheng Ling, Khaled Benkrid, Tsuyoshi Hamada
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 4 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
VR
2009
IEEE
172views Virtual Reality» more  VR 2009»
15 years 4 months ago
Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays
How do users of virtual environments perceive virtual space? Many experiments have explored this question, but most of these have used head-mounted immersive displays. This paper ...
Eric Klein, J. Edward Swan II, Gregory S. Schmidt,...
KBSE
2009
IEEE
15 years 4 months ago
Static Validation of C Preprocessor Macros
—The widely used C preprocessor (CPP) is generally considered a source of difficulty for understanding and maintaining C/C++ programs. The main reason for this difficulty is CP...
Andreas Saebjoernsen, Lingxiao Jiang, Daniel J. Qu...