Sciweavers

459 search results - page 72 / 92
» Topic modeling with network regularization
Sort
View
ICASSP
2008
IEEE
15 years 6 months ago
System combination using auxiliary information for speaker verification
Recent studies in speaker recognition have shown that scorelevel combination of subsystems can yield significant performance gains over individual subsystems. We explore the use ...
Luciana Ferrer, Martin Graciarena, Argyrios Zymnis...
89
Voted
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 11 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
DSN
2006
IEEE
15 years 5 months ago
Evaluating the Performability of Systems with Background Jobs
As most computer systems are expected to remain operational 24 hours a day, 7 days a week, they must complete maintenance work while in operation. This work is in addition to the ...
Qi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska,...
114
Voted
IJCNN
2006
IEEE
15 years 5 months ago
Nonlinear principal component analysis of noisy data
With very noisy data, having plentiful samples eliminates overfitting in nonlinear regression, but not in nonlinear principal component analysis (NLPCA). To overcome this problem...
William W. Hsieh
INFOCOM
2002
IEEE
15 years 4 months ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani