Scheduled Maintenance on December 18, 2017:
IEEE Xplore will undergo system maintenance from 1:00 - 5:00 PM EST. During this time there may be intermittent impact on performance. We apologize for any inconvenience.

2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100)

5-9 June 2000

Go

Filter Results

Displaying Results 1 - 25 of 177
  • 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing Proceedings [front matter]

    Publication Year: 2000, Page(s):i - lxxx
    Request permission for commercial reuse | PDF file iconPDF (4195 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):A1 - A11
    Request permission for commercial reuse | PDF file iconPDF (1070 KB)
    Freely Available from IEEE
  • Decoding metrics and their applications in VLSI turbo decoders

    Publication Year: 2000, Page(s):3370 - 3373 vol.6
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    In this paper, a set of variables which can be easily computed in the course of iterative decoding of turbo decoders called decoding metrics (DMs) are introduced. According to the measured DMs after each iteration, a lot of information other than signal-to-noise ratio (SNR) in the received bits, such as how good/bad the current block is and how close the current iteration of decoding is to converg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trace back techniques adapted to the surviving memory management in the M algorithm

    Publication Year: 2000, Page(s):3366 - 3369 vol.6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A new architecture for survivor memory management in the M algorithm is presented. So far, classical implementations of the survivor memory management employ the register exchange procedure. The architecture presented here is based on the trace back procedure used in the Viterbi algorithm. Using a new pointer which indicates the number of the surviving path given by the sorting operation during th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameterized dataflow modeling of DSP systems

    Publication Year: 2000, Page(s):3362 - 3365 vol.6
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    Dataflow has proven to be an attractive computation model for programming DSP applications. A restricted version of dataflow, termed synchronous dataflow (SDF), that offers strong compile-time predictability properties, but has limited expressive power, has been studied extensively in the DSP context. Many extensions to synchronous dataflow have been proposed to increase its expressivity, while ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast OFDM-CDMA user demultiplexing architecture

    Publication Year: 2000, Page(s):3358 - 3361 vol.6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    A fast algorithm based on a butterfly structure is presented that demultiplexes the symbols of a particular type of MC-MA (multi-carrier multiple-access) modulation previously proposed for indoor radio communications. A special transform is used to packetize the different symbols on the down-link such that the code sequences associated with the different symbols are transmitted synchronously at th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive-search residual vector quantizer for airborne reconnaissance

    Publication Year: 2000, Page(s):3291 - 3294 vol.6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    A lossy image compression algorithm designed for high-speed, high quality data applications is described. The algorithm consists of a vector quantizer followed by a modified Huffman entropy encoder. The quantizer is a mean-removed, adaptive-search, residual vector quantizer. A few details of a high-speed hardware implementation for reconnaissance are given, as well as an example of the performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to model communication for mapping and scheduling DSP-applications

    Publication Year: 2000, Page(s):3354 - 3357 vol.6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    We present a novel approach to model inter-processor communication in multi-DSP systems. In most multi-DSP systems, inter-processor communication is realized by transferring data over point-to-point links with hardware FIFO buffers. Direct memory access (DMA) is additionally used to concurrently transfer data to the FIFO buffers and perform computation. Our model accounts for the limited size of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet packet transforms for system-on-chip applications

    Publication Year: 2000, Page(s):3287 - 3290 vol.6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A methodology for the production of silicon cores for wavelet packet decomposition has been developed. The scheme utilizes efficient scalable architectures for both orthonormal and biorthgonal wavelet transforms. The cores produced from these architectures can be readily scaled for any wavelet function and are easily configurable for any subband structure. The cores are fully parameterized in term... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalization of the cyclic convolution system and its applications

    Publication Year: 2000, Page(s):3351 - 3353 vol.6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    This paper introduces a generalized cyclic convolution which can be implemented via the conventional cyclic convolution system by the discrete Fourier transform (DFT) with pre-multiplication for the input and post-multiplication for the output. The generalized cyclic convolution is applied for computing a negacyclic convolution. Comparison shows that the proposed implementation is more efficient a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical pipelining and folding of QRD-RLS adaptive filters

    Publication Year: 2000, Page(s):3283 - 3286 vol.6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    A novel approach for hierarchically pipelining and folding the CORDIC-based systolic triangular array of a QRD-RLS filter to a small fixed size array is presented. With the annihilation-reordering look-ahead transformation, the iteration bound of a QRD-RLS filter can be reduced proportional to the look-ahead level. This paper presents, for the first time, how to pipeline and fold such a look-ahead... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualising error surfaces for adaptive filters and other purposes

    Publication Year: 2000, Page(s):3522 - 3525 vol.6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Modern neural and adaptive systems often have complicated error performance surfaces with many local extrema. Visualising and understanding these surfaces is critical to effective tuning of these systems but almost all visualisation methods are confined to two dimensions. Here we show how to use a morphological scale-space transform to convert these multi-dimensional complex error surfaces into tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural equalizer with adaptive multidimensional spline activation functions

    Publication Year: 2000, Page(s):3498 - 3501 vol.6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    This paper presents a new neural architecture suitable for digital signal processing application. The architecture, based on adaptable multidimensional activation functions, allows one to collect information from the previous network layer in aggregate form. In other words the number of network connections (structural complexity) can be very low respect to the problem complexity. This fact, as exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RISC+SIMD=DSP?

    Publication Year: 2000, Page(s):3211 - 3214 vol.6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    The adoptions of RISC (reduced instruction set computer) and SIMD (single instruction multiple data) architectures in processor design have been proven great successes in boosting processor performance. System designers and processor architects are now asking if the combination of both can produce a unified digital signal processor (DSP)/microcontroller (MC) for system-on-a-chip design. The unifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In search of the optimal Walsh-Hadamard transform

    Publication Year: 2000, Page(s):3347 - 3350 vol.6
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    This paper describes an approach to implementing and optimizing fast signal transforms. Algorithms for computing signal transforms are expressed by symbolic expressions, which can be automatically generated and translated into programs. Optimizing an implementation involves searching for the fastest program obtained from one of the possible expressions. We apply this methodology to the implementat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using clock changes in multi-path applications

    Publication Year: 2000, Page(s):3838 - 3841 vol.6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    This paper studies an alternative to the Watterson (1970) model for multi-path channels. The new model is based on the introduction of random delays. This model is shown to well-represent different kinds of spectra. An application is presented in the case of backscattering from sea surface at small grazing angles of incidence. This clock change-based model allows one to well-describe the physical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explicit Cook-Toom algorithm for linear convolution

    Publication Year: 2000, Page(s):3279 - 3282 vol.6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The short length linear convolution, conventionally computed by the Cook-Toom algorithm, is important since it is the building block of large convolution algorithms. To compute the linear convolution of N and M points, the Cook-Toom algorithm computes the Lagrange interpolation at L=N+M-1 real numbers. However, the computation is often tedious and has only been carried out for special integers. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inference in symmetric alpha-stable noise using MCMC and the slice sampler

    Publication Year: 2000, Page(s):3806 - 3809 vol.6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    We have previously shown how to perform inference about symmetric stable processes using Monte Carlo EM (MCEM) and Markov chain Monte Carlo (MCMC) techniques. Simulation based methods such as these are an excellent tool for inference with stable law distributions, since they do not require any direct evaluation of the stable density function, which is unavailable analytically in the general case. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multiresolution approach to spike detection in EEG

    Publication Year: 2000, Page(s):3582 - 3585 vol.6
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    A technique is proposed for the automatic detection of spikes in electroencephalograms (EEG). A multiresolution approach and a non-linear energy operator are exploited. The signal on each EEG channel is decomposed into three subbands using a non-decimated wavelet transform. Each subband is analyzed by using a non-linear energy operator, in order to detect peaks. A decision rule detects the presenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust clustering of acoustic emission signals using the Kohonen network

    Publication Year: 2000, Page(s):3891 - 3894 vol.6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    Acoustic emission-based techniques are promising for nondestructive inspection of mechanical systems. For reliable automatic fault monitoring, it is important to identify the transient crack-related signals in the presence of strong time-varying noise and other interference. In this paper we propose the application of the Kohonen network for this purpose. The principal components of the short-time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tomography with diffusing photons: a Feynman path integral perspective

    Publication Year: 2000, Page(s):3791 - 3794 vol.6
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    We consider the problem of imaging the optical absorption or fluorescent source distribution of a highly-scattering medium probed by diffusive light. Analytic solutions to the tomographic image reconstruction problem are presented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Viterbi algorithm for a VLIW DSP

    Publication Year: 2000, Page(s):3390 - 3393 vol.6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    The Viterbi decoder algorithm for a very high data-rate satellite receiver is computationally very intensive. Dedicated commercially available chips are used for high rate convolutional decoders. With the advent of high speed DSPs, these computationally intensive algorithms can be mapped on programmable DSPs running test of the receiver algorithm. This paper presents the Viterbi algorithm speciall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image display in teaching image processing .I. Monochrome images

    Publication Year: 2000, Page(s):3518 - 3521 vol.6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    The concentration of most image processing courses is on the various algorithms used to alter an input image or data to produce a desired output image. Little effort is expended on teaching the appropriate display methods that are required to accurately demonstrate the effectiveness of the processing algorithms under investigation. This paper reviews the fundamentals of image display that every st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Custom computing implementation of two-step block matching search algorithm

    Publication Year: 2000, Page(s):3231 - 3234 vol.6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    Many fast search block-matching motion estimation (BMME) algorithms has been developed in order to minimize the search positions and speed up the computation but they do not consider how they can be effectively implemented by hardware. We propose a new regular fast search block-matching motion estimation algorithm named two step search (2SS). The 2SS BMME will then be implemented on the SPACE2 cus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling text with generalizable Gaussian mixtures

    Publication Year: 2000, Page(s):3494 - 3497 vol.6
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    We apply and discuss generalizable Gaussian mixture (GGM) models for text mining. The model automatically adapts model complexity for a given text representation. We show that the generalizability of these models depends on the dimensionality of the representation and the sample size. We discuss the relation between supervised and unsupervised learning in the test data. Finally, we implement a nov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.