Sciweavers

110 search results - page 13 / 22
» Turning Teenagers into Stores
Sort
View
60
Voted
IEICET
2006
100views more  IEICET 2006»
14 years 9 months ago
Generating F0 Contours by Statistical Manipulation of Natural F0 Shapes
This paper proposes a method of generating F0 contours from natural F0 segmental shapes for speech synthesis. The extracted shapes of F0 units are basically kept unchanged, by eli...
Takashi Saito
ALGORITHMICA
2005
97views more  ALGORITHMICA 2005»
14 years 9 months ago
Representing Trees of Higher Degree
This paper focuses on space efficient representations of rooted trees that permit basic navigation in constant time. While most of the previous work has focused on binary trees, w...
David Benoit, Erik D. Demaine, J. Ian Munro, Rajee...
INFOCOM
2010
IEEE
14 years 8 months ago
Optimal Activation and Transmission Control in Delay Tolerant Networks
—Much research has been devoted to maximize the life time of mobile ad-hoc networks. Life time has often been defined as the time elapsed until the first node is out of battery...
Eitan Altman, Amar Prakash Azad, Tamer Basar, Fran...
SIGMOD
2010
ACM
159views Database» more  SIGMOD 2010»
14 years 8 months ago
Histograms reloaded: the merits of bucket diversity
Virtually all histograms store for each bucket the number of distinct values it contains and their average frequency. In this paper, we question this paradigm. We start out by inv...
Carl-Christian Kanne, Guido Moerkotte
GLOBECOM
2010
IEEE
14 years 7 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...