Sciweavers

1033 search results - page 183 / 207
» Software Quality in the Objectory Process
Sort
View
TASLP
2010
165views more  TASLP 2010»
14 years 10 months ago
Model-Based Dereverberation Preserving Binaural Cues
The ability of the human auditory system for sound localization mainly depends on the binaural cues, especially interaural time and level differences (ITD and ILD). In the context ...
Marco Jeub, M. Schafer, Thomas Esch, Peter Vary
ICASSP
2008
IEEE
15 years 10 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...
AINA
2010
IEEE
15 years 9 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
PODC
2006
ACM
15 years 10 months ago
Grouped distributed queues: distributed queue, proportional share multiprocessor scheduling
We present Grouped Distributed Queues (GDQ), the first proportional share scheduler for multiprocessor systems that scales well with a large number of processors and processes. G...
Bogdan Caprita, Jason Nieh, Clifford Stein
DAC
2000
ACM
16 years 5 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak