Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
finding » findings (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
finding » findings (Expand Search)
-
41
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
Get full text
Get full text
article -
42
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
43
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
44
Query acceleration in distributed database systems
Published 2001“…Query optimization strategies aim to minimize the cost of transferring data across networks. Many techniques and algorithms have been proposed to optimize queries. …”
Get full text
Get full text
Get full text
article -
45
-
46
-
47
-
48
-
49
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
50
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
51
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
52
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
53
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
-
54
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The first one is the GAFlow, the Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of interest that is on all their runtime paths. The second one is the GDFlow, the Closest Guaranteed Descendant, which returns the closest child join point that can be reached by all paths starting from the pointcuts of interest. …”
Get full text
Get full text
Get full text
article -
55
New aspect-oriented constructs for security hardening concerns
Published 2009“…The first one is the GAFlow, Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of interest that is on all their runtime paths. The second one is the GDFlow, Closest Guaranteed Descendant, which returns the closest child join point that can be reached by all paths starting from the pointcut of interest. …”
Get full text
Get full text
Get full text
article