Sciweavers

777 search results - page 25 / 156
» presence 2010
Sort
View
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
14 years 9 months ago
Closed-Loop System Identification with Modifications of the Instrumental Variable Method
Least-squares method is the most popular method for parameter estimation. It is easy applicable, but it has considerable drawback. Under well-known conditions in the presence of no...
Nasko Atanasov, Alexander Ichtev
78
Voted
INTERSPEECH
2010
14 years 7 months ago
Morphological and predictability effects on schwa reduction: the case of dutch word-initial syllables
This corpus-based study shows that the presence and duration of schwa in Dutch word-initial syllables are affected by a word's predictability and its morphological structure....
Iris Hanique, Barbara Schuppler, Mirjam Ernestus
INTERSPEECH
2010
14 years 7 months ago
Influence of lexical tones on intonation in kammu
The aim of this study is to investigate how the presence of lexical tones influences the realization of focal accent and sentence intonation. The language studied is Kammu, a lang...
Anastasia Karlsson, David House, Jan-Olof Svantess...
97
Voted
JMLR
2010
163views more  JMLR 2010»
14 years 7 months ago
Detection of Server-side Web Attacks
Web servers and server-side applications constitute the key components of modern Internet services. We present a pattern recognition system to the detection of intrusion attempts ...
Igino Corona, Giorgio Giacinto
104
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 17 days ago
Secure Lossy Source Coding with Side Information at the Decoders
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referre...
Joffrey Villard, Pablo Piantanida