Sciweavers

20017 search results - page 328 / 4004
» Using personas effectively
Sort
View
EJWCN
2010
237views more  EJWCN 2010»
14 years 11 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
TASLP
2010
159views more  TASLP 2010»
14 years 11 months ago
Under-Determined Reverberant Audio Source Separation Using a Full-Rank Spatial Covariance Model
This article addresses the modeling of reverberant recording environments in the context of under-determined convolutive blind source separation. We model the contribution of each ...
Ngoc Q. K. Duong, Emmanuel Vincent, Rémi Gr...
150
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Acoustic-to-articulatory inversion using an episodic memory
This paper presents a new acoustic-to-articulatory inversion methodbased on an episodic memory, which is an interesting model for two reasons. First, it does not rely on any assum...
Sébastien Demange, Slim Ouni
130
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Source number estimation in impulsive noise environments using bootstrap techniques and robust statistics
We consider the problem of source number estimation in array processing when impulsive noise is present. To combat impulsive noise more effectively, two robust estimators with hig...
Zhihua Lu, Yacine Chakhchoukh, Abdelhak M. Zoubir
ICASSP
2011
IEEE
14 years 8 months ago
Image inpainting-based edge enhancement using the eikonal equation
This paper proposes a novel application of image inpainting techniques for the edge enhancement problems in image deblurring and denoising. The edge enhancement effect is achieved...
Zhaozhong Wang