The aim of this work was to develop a procedure that allows prosodic modifications of speech signals without impairing the quality. The developed procedure is based on the Fourier analysis/synthesis technique with sev...
详细信息
ISBN:
(纸本)0780335554
The aim of this work was to develop a procedure that allows prosodic modifications of speech signals without impairing the quality. The developed procedure is based on the Fourier analysis/synthesis technique with several improvements on the analysis side, such as the analysis of signals with rapidly changing F-0 and the analysis of weak spectral components. Also for the modification of the short-time spectrum and for the reconstruction of the speech signal some new methods have been introduced. The most important one, in terms of speech quality, is the way of phase compensation that limits the absolute time shift to half the pitch period. The developed procedure is used in our high-quality text-to-speech synthesis system that is based on concatenation of prosodically modified diphones.
A method for optimizing the schedule and allocation of uniform algorithms onto processor arrays is derived. The main results described in the following paper are: (1) single (integer) linear programs are given for the...
A method for optimizing the schedule and allocation of uniform algorithms onto processor arrays is derived. The main results described in the following paper are: (1) single (integer) linear programs are given for the optimal schedule of regular algorithms with and without resource constraints, (2) the class of algorithms is extended by allowing certain non-convex index domains, (3) efficient branch and bound techniques are used such that problems of relevant size can be solved. Moreover, additional constraints such as cache memory, bus bandwidths and access conflicts can be considered also. The results are applied to an example of relevant size.
The pursuit of energy efficiency is becoming more and more important in hardware and software designs. This research explores energy-efficient scheduling for a periodic real-time task with uncertain execution time in ...
详细信息
The pursuit of energy efficiency is becoming more and more important in hardware and software designs. This research explores energy-efficient scheduling for a periodic real-time task with uncertain execution time in dynamic voltage scaling (DVS) systems with non-negligible leakage/static power consumption. Distinct from the assumption of non-reducible static power consumption in the literature, this paper considers the possibility to reduce it by turning a processor to a dormant mode. We propose an algorithm to derive an optimal frequency assignment to minimize the expected energy consumption without procrastination, while another extended algorithm is developed to apply procrastination scheduling for further energy reduction. Experimental results show that the proposed algorithms can effectively minimize the expected energy consumption.
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as syn...
详细信息
In this paper, we introduce a model called regular state machines (RSMs) that characterizes a class of state transition systems with regular transition behavior. It turns out that many process graph models such as synchronous dataflow graphs and Petri nets have a state transition system that may be described and analyzed in the RSM *** particular, the proposed approach unifies methods known for the above-mentioned subclasses and yields new results concerning boundedness, deadlocks, scheduling, and formal verification.
Symbolic model checking tries to reduce the state explosion problem by implicit construction of the state space. The major limiting factor is the size of the symbolic representation mostly stored in huge binary decisi...
详细信息
Symbolic model checking tries to reduce the state explosion problem by implicit construction of the state space. The major limiting factor is the size of the symbolic representation mostly stored in huge binary decision diagrams. A new approach to symbolic model checking of Petri nets and related models of computation is presented, outperforming the conventional one and avoiding some of its drawbacks. Our approach is based on a novel, efficient form of representation for multi-valued functions called interval decision diagram (IDD) and the corresponding image computation technique using interval mapping diagrams (IMDs). IDDs and IMDs are introduced, their properties are described, and the feasibility of the new approach is shown with some experimental results.
Cooperative software engineering typically involves many actors and resources that cooperate in a complex distributed and heterogeneous world. In the DIPS (Distributed Integrated Process Services) project, a 3D model ...
详细信息
Cooperative software engineering typically involves many actors and resources that cooperate in a complex distributed and heterogeneous world. In the DIPS (Distributed Integrated Process Services) project, a 3D model is used for the definition, enactment and tracing of software development processes, which expresses both the structure and evolution of such processes. This paper discusses how an optimal architecture was evaluated to implement the process model in a process support framework. Process-specific and general requirements are identified, and expected usage patterns of a DIPS-based environment are analyzed. A set of potential architecture variants is proposed, and implications of the requirements and usage patterns on the variants are discussed qualitatively. An evaluation of the architecture alternatives leads to the design of a hybrid DIPS architecture based on distributed heterogeneous objects. The prototype DIPS implementation is briefly outlined.
In this paper, the problem of automatically mapping large-grain dataflow programs onto heterogeneous hardware/software architectures is treated. Starting with a given hardware/software partition, interfaces are insert...
详细信息
In this paper, the problem of automatically mapping large-grain dataflow programs onto heterogeneous hardware/software architectures is treated. Starting with a given hardware/software partition, interfaces are inserted into the specification to account for communication, in particular across hardware/software boundaries. Depending on the target architecture, the interfaces are refined according to given communication constraints (bus protocols, memory mapping, interrupts, DMA, etc.). A framework is described that uses an object-oriented approach to transform a given dataflow graph and to generate code for the actors as well as for the interfaces. The object-orientation enables an easy migration (retargeting) of typical communication primitives to other target architectures.
We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual hosts like ratio of outgoing to incom...
详细信息
We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual hosts like ratio of outgoing to incoming traffic, responsiveness and number of connections. These properties are used to group hosts into distinct behaviour classes. We use flow-level (Cisco Net Flow) information exported by the border routers of a Swiss Internet backbone provider (AS559/SWITCH). By tracking the cardinality of each class over time and alarming on fast increases and other significant changes, we can early and reliably detect worm outbreaks. We successfully validated our method with archived flow-level traces of recent major Internet e-mail based worms such as MyDoomA and Sobig.F, and fast spreading network worms like Witty and Blaster. Our method is generic in the sense that it does not require any previous knowledge about the exploits and scanning method used by the worms. It can give a set of suspicious hosts in near real-time that have recently and drastically changed their network behaviour and hence are highly likely to be infected.
The increasing assortment of devices with IP connectivity contributes to the high popularity of video sharing over the Internet. High traffic generated by such applications at the source can be better distributed usin...
详细信息
The increasing assortment of devices with IP connectivity contributes to the high popularity of video sharing over the Internet. High traffic generated by such applications at the source can be better distributed using a peer-to-peer overlay, since every user forwards information to other users. Current implementations target either live or on demand video streaming. LiveShift is an application that combines both approaches. While video is transmitted through the peer-to-peer network in a live fashion, all peers participate in a distributed storage. This adds ability to replay time-shifted streams from other peers in a distributed and scalable manner. For the demonstration, a decentralized network is used, with peers running on EMANICSlab nodes and notebook computers.
暂无评论