Channel compensation has been proved to be an effective approach for robust speech recognition. We first use two level cepstral mean substraction (CMS) for channel compensation in telephone speech recognition, and the...
详细信息
Channel compensation has been proved to be an effective approach for robust speech recognition. We first use two level cepstral mean substraction (CMS) for channel compensation in telephone speech recognition, and then propose a new channel compensation method, RMFCC. For all experiments, a Korean isolated 84 words database consisting of 80 speakers collected from a local telephone line is adopted. Using the RMFCC, a 39.8% reduction in word error rate is obtained relative to the conventional HMM system. It is shown from the experiments that the RMFCC, compared with RASTA, reduces the computational complexity without losing accuracy, and is also better than the CMS and two level CMS in performance.
Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually t...
ISBN:
(纸本)9780897919111
Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually the closed policy). As a consequence, although different policy choices are possible in theory, in practice only a specific policy can be actually applied within a given system. However, protection requirements within a system can vary dramatically, and no single policy may simultaneously satisfy them *** this paper we present a flexible authorization manager (FAM) that can enforce multiple access control policies within a single, unified system. FAM is based on a language through which users can specify authorizations and access control policies to be applied in controlling execution of specific actions on given objects. We formally define the language and properties required to hold on the security specifications and prove that this language can express all security specifications. Furthermore, we show that all programs expressed in this language (called FAM/CAM-programs) are also guaranteed to be consistent (i.e., no conflicting access decisions occur) and CAM-programs are complete (i.e., every access is either authorized or denied). We then illustrate how several well-known protection policies proposed in the literature can be expressed in the FAM/CAM language and how users can customize the access control by specifying their own policies. The result is an access control mechanism which is flexible, since different access control policies can all coexist in the same data system, and extensible, since it can be augmented with any new policy a specific application or user may require.
In our paper, "An analytical model for designing memory hierarchies" (see ibid., vol. 45, no. 10, p. 180-1, 194 (1996)), we made the following statement: "Failing to apply a specific model of workload l...
详细信息
In our paper, "An analytical model for designing memory hierarchies" (see ibid., vol. 45, no. 10, p. 180-1, 194 (1996)), we made the following statement: "Failing to apply a specific model of workload locality makes it impossible to provide an easily used, closed-form solution for the optimal cache configuration, and so the results from these papers have contained dependencies on the cache configuration-the number of levels, or the sizes and hit rates of the levels." Our description did not accurately reflect the contents of the paper by J.E. MacDonald and K.L. Sigworth (1975), and we regret any false impressions caused by the inaccuracy.
As a very promising new data model, constraint database is attracting a growing interest recently. For better applications, we need to study its design theory. But to the best of our knowledge, no papers about the des...
Real time logic (RTL) was introduced as a formalism for reasoning about the relative and absolute timing properties of computational tasks of discrete real-time systems. Extended real time logic (ERTL) is a formalism ...
详细信息
Extended Real Time Logic (ERTL) is proposed for the modelling and analysis of hybrid systems, taking as a basis Real Time Logic (RTL). RTL is a first order logic with uninterpreted predicates which relate events of a ...
详细信息
The Center of Excellence for software and systemsengineering (CECASE) at the University of Kansas was established by the State of Kansas as a vehicle for developing and transferring advanced technology to Kansas busi...
详细信息
The Center of Excellence for software and systemsengineering (CECASE) at the University of Kansas was established by the State of Kansas as a vehicle for developing and transferring advanced technology to Kansas businesses. In this paper we describe three CECASE projects that used three different methods of successfully transferring advanced Artificial Intelligence (AI) technology to Kansas companies. We describe the problems encountered, approaches tried, and successful solutions used. These projects and associated Al technology transfer methods can be used as models by other research and development organizations who wish to enhance the probability of success of their technology transfer.
View materialization is known to be a valuable technique for performance optimization in relational databases, and much work has been done addressing the problem of consistently maintaining relational views under upda...
详细信息
View materialization is known to be a valuable technique for performance optimization in relational databases, and much work has been done addressing the problem of consistently maintaining relational views under update operations. However, little progress has been made thus far regarding the topic of view materialization in object-oriented databases (OODBs). In this paper, we demonstrate that there are several significant differences between the relational and object-oriented paradigms that can be exploited when addressing the object-oriented view materialization problem. We use the subsumption relationships between classes to identify branches of classes to which we do not need to propagate updates. Similarly, we use encapsulated interfaces combined with the fact that any unique database property is inherited from a single location to provide a "registration/notification" service for optimizing incremental view updates. We also report results from the experimental studies we have run on the MultiView system measuring the impact of these optimization strategies.
暂无评论