Sciweavers

4463 search results - page 580 / 893
» computer 2000
Sort
View
ICISC
2000
102views Cryptology» more  ICISC 2000»
15 years 6 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
134
Voted
IMAGING
2000
15 years 6 months ago
A Composite Spectral Model and Its Applications
A new spectral representation called the composite model is proposed. Its key point is to decompose all spectra into a smooth background and a collection of spikes. The smooth par...
Yinlong Sun, F. David Fracchia, Mark S. Drew
NIPS
2000
15 years 6 months ago
Speech Denoising and Dereverberation Using Probabilistic Models
This paper presents a unified probabilistic framework for denoising and dereverberation of speech signals. The framework transforms the denoising and dereverberation problems into...
Hagai Attias, John C. Platt, Alex Acero, Li Deng
NIPS
2000
15 years 6 months ago
Modelling Spatial Recall, Mental Imagery and Neglect
We present a computational model of the neural mechanisms in the parietal and temporal lobes that support spatial navigation, recall of scenes and imagery of the products of recal...
Suzanna Becker, Neil Burgess
183
Voted
NIPS
2000
15 years 6 months ago
On Reversing Jensen's Inequality
Jensen's inequality is a powerful mathematical tool and one of the workhorses in statistical learning. Its applications therein include the EM algorithm, Bayesian estimation ...
Tony Jebara, Alex Pentland