Sciweavers

1626 search results - page 221 / 326
» Subtyping with Power Types
Sort
View
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Emotional Speech Synthesis using Subspace Constraints in Prosody
An efficient speech synthesis method that uses subspace constraint in prosody is proposed. Conventional unit selection methods concatenate speech segments stored in database, tha...
Shinya Mori, Tsuyoshi Moriyama, Shinji Ozawa
IEEECIT
2006
IEEE
15 years 11 months ago
Design of a Reliable NAND Flash Software for Mobile Device
Flash memory in various embedded systems such as the backing memory is frequently used in an active type of RFID reader. Because batteries are used in a shifting environment and s...
TaeHoon Kim, KwangMu Shin, TaeHoon Lee, KiDong Jun...
IJCNN
2006
IEEE
15 years 11 months ago
Online Training of a Generalized Neuron with Particle Swarm Optimization
— Neural networks are used in a wide number of fields including signal and image processing, modeling and control and pattern recognition. Some of the most common type of neural ...
Raveesh Kiran, Sandhya R. Jetti, Ganesh K. Venayag...
IPPS
2006
IEEE
15 years 11 months ago
Fault and intrusion tolerance of wireless sensor networks
The following three questions should be answered in developing new topology with more powerful ability to tolerate node-failure in wireless sensor network. First, what is node-fai...
Liang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
15 years 11 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...