Sciweavers

161 search results - page 8 / 33
» Verifying Compensating Transactions
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Non-linear noise compensation for robust speech recognition using Gauss-Newton method
In this paper, we present the Gauss-Newton method as a unified approach to optimizing non-linear noise compensation models, such as vector Taylor series (VTS), data-driven parall...
Yong Zhao, Biing-Hwang Juang
EDOC
2003
IEEE
15 years 2 months ago
Compensation is Not Enough
– An important problem in designing infrastructure to support business-to-business integration (B2Bi) is how to cancel a long-running interaction (either because the user has cha...
Paul Greenfield, Alan Fekete, Julian Jang, Dean Ku...
RV
2010
Springer
133views Hardware» more  RV 2010»
14 years 8 months ago
Compensation-Aware Runtime Monitoring
To avoid large overheads induced by runtime monitoring, the use of asynchronous log-based monitoring is sometimes adopted — even though this implies that the system may proceed f...
Christian Colombo, Gordon J. Pace, Patrick Abela

Publication
453views
16 years 2 months ago
Analysis and Compensation of Rolling Shutter Effect
Due to the sequential-readout structure of complementary-metal-oxide semiconductor image sensor array, each scanline of the acquired image is exposed at a different time, resulting...
Chia-Kai Liang, Li-Wen Chang, Homer Chen
TKDE
2002
67views more  TKDE 2002»
14 years 9 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu