Sciweavers

5544 search results - page 983 / 1109
» Three Inadequate Models
Sort
View
ER
2007
Springer
137views Database» more  ER 2007»
15 years 4 months ago
Prioritized Preferences and Choice Constraints
It is increasingly recognised that user preferences should be addressed in many advanced database applications, such as adaptive searching in databases. However, the fundamental is...
Wilfred Ng
SPEAKERC
2007
Springer
312views Biometrics» more  SPEAKERC 2007»
15 years 4 months ago
Development of a Femininity Estimator for Voice Therapy of Gender Identity Disorder Clients
Abstract. This work describes the development of an automatic estimator of perceptual femininity (PF) of an input utterance using speaker verification techniques. The estimator wa...
Nobuaki Minematsu, Kyoko Sakuraba
FCCM
2006
IEEE
133views VLSI» more  FCCM 2006»
15 years 4 months ago
A Scalable FPGA-based Multiprocessor
It has been shown that a small number of FPGAs can significantly accelerate certain computing tasks by up to two or three orders of magnitude. However, particularly intensive lar...
Arun Patel, Christopher A. Madill, Manuel Salda&nt...
IMC
2006
ACM
15 years 4 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
IMC
2006
ACM
15 years 4 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie