Sciweavers

10412 search results - page 1888 / 2083
» The efficiency of algorithms - misconceptions
Sort
View
VLSI
2010
Springer
14 years 11 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
ICASSP
2011
IEEE
14 years 8 months ago
Defining the controlling parameter in constrained discriminative linear transform for supervised speaker adaptation
Constrained discriminative linear transform (CDLT) optimized with Extended Baum-Welch (EBW) has been presented in the literature as a discriminative speaker adaptation method that...
Danning Jiang, Dimitri Kanevsky, Emmanuel Yashchin...
ICASSP
2011
IEEE
14 years 8 months ago
Rapid feature space MLLR speaker adaptation with bilinear models
In this paper, we propose a novel method for rapid feature space Maximum Likelihood Linear Regression (FMLLR) speaker adaptation based on bilinear models. When the amount of adapt...
Shilei Zhang, Peder A. Olsen, Yong Qin
AICT
2010
IEEE
216views Communications» more  AICT 2010»
14 years 8 months ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
TVCG
2012
196views Hardware» more  TVCG 2012»
13 years 6 months ago
Robust Morse Decompositions of Piecewise Constant Vector Fields
—In this paper, we introduce a new approach to computing a Morse decomposition of a vector field on a triangulated manifold surface. The basic idea is to convert the input vector...
Andrzej Szymczak, Eugene Zhang
« Prev « First page 1888 / 2083 Last » Next »