Sciweavers

2111 search results - page 192 / 423
» Understanding the Yarowsky Algorithm
Sort
View
IWRT
2008
109views Communications» more  IWRT 2008»
15 years 3 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
115
Voted
MODELLIERUNG
2008
15 years 3 months ago
Domain-Specific Languages for Wireless Sensor Networks
The development of software for wireless sensor networks is involved and complex. This does not only impose much work on programmers but also prevents domain experts from directly ...
Daniel A. Sadilek
NAACL
2007
15 years 3 months ago
A Geometric Interpretation of Non-Target-Normalized Maximum Cross-Channel Correlation for Vocal Activity Detection in Meetings
Vocal activity detection is an important technology for both automatic speech recognition and automatic speech understanding. In meetings, standard vocal activity detection algori...
Kornel Laskowski, Tanja Schultz
RIAO
2007
15 years 3 months ago
ORCHIVE: Digitizing and Analyzing Orca Vocalizations
This paper describes the process of creating a large digital archive of killer whale or orca vocalizations. The goal of the project is to digitize approximately 20000 hours of exi...
George Tzanetakis, Mathieu Lagrange, Paul Spong, H...
137
Voted
AAAI
2004
15 years 3 months ago
MAX-2-SAT: How Good Is Tabu Search in the Worst-Case?
Tabu search algorithms are amongst the most successful local search based methods for the maximum satisfiability problem. The practical superiority of tabu search over the local s...
Monaldo Mastrolilli, Luca Maria Gambardella