Sciweavers

1492 search results - page 239 / 299
» Testing Properties of Constraint-Graphs
Sort
View
162
Voted
CSL
2007
Springer
15 years 3 months ago
Speaker-adaptive learning of resonance targets in a hidden trajectory model of speech coarticulation
A novel speaker-adaptive learning algorithm is developed and evaluated for a hidden trajectory model of speech coarticulation and reduction. Central to this model is the process o...
Dong Yu, Li Deng, Alex Acero
JEI
2006
128views more  JEI 2006»
15 years 3 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
JFP
2006
113views more  JFP 2006»
15 years 3 months ago
Efficient manipulation of binary data using pattern matching
Pattern matching is an important operation in functional programs. So far, pattern matching has been investigated in the context of structured terms. This article presents an appr...
Per Gustafsson, Konstantinos F. Sagonas
126
Voted
ECCC
2007
144views more  ECCC 2007»
15 years 3 months ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
140
Voted
JSAC
2006
165views more  JSAC 2006»
15 years 3 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy