Sciweavers

1751 search results - page 280 / 351
» Search on mobile phones
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 7 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
PUC
2010
138views more  PUC 2010»
14 years 4 months ago
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
In this paper, we describe the design and implementation of an audio wiki application accessible via both the Public Switched Telephone Network and the Internet. The application ex...
Constantinos Kolias, Vassilis Kolias, Ioannis Anag...
WH
2010
142views Healthcare» more  WH 2010»
14 years 4 months ago
Social sensing: obesity, unhealthy eating and exercise in face-to-face networks
What is the role of face-to-face interactions in the diffusion of health-related behaviors- diet choices, exercise habits, and long-term weight changes? We use co-location and com...
Anmol Madan, Sai T. Moturu, David Lazer, Alex Pent...
ICASSP
2011
IEEE
14 years 1 months ago
Speech bandwidth extension using Gaussian mixture model-based estimation of the highband mel spectrum
The quality and intelligibility of narrowband telephone speech can be enhanced by artifical bandwidth extension. This study combines Gaussian mixture model-based (GMM) mel spectr...
Hannu Pulakka, Ulpu Remes, Kalle J. Palomäki,...
ICASSP
2011
IEEE
14 years 1 months ago
A simplified Subspace Gaussian Mixture to compact acoustic models for speech recognition
Speech recognition applications are known to require a significant amount of resources (memory, computing power). However, embedded speech recognition systems, such as in mobile p...
Mohamed Bouallegue, Driss Matrouf, Georges Linares