2006
DOI: 10.1016/j.specom.2006.07.004
|View full text |Cite
|
Sign up to set email alerts
|

Efficient client–server based implementations of mobile speech recognition services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…There are, however, limitations in the application of such technology. These limitations include, but are not limited to, the operational requirement for such systems to maintain a constant client-server connection and the need for efficient deployment of normalisation techniques to accommodate different speaker accents [1]. In addition, where the speech technology is used for security purposes, the need for the voice utterances to be transmitted over a network introduces security concerns.…”
Section: Introductionmentioning
confidence: 99%
“…There are, however, limitations in the application of such technology. These limitations include, but are not limited to, the operational requirement for such systems to maintain a constant client-server connection and the need for efficient deployment of normalisation techniques to accommodate different speaker accents [1]. In addition, where the speech technology is used for security purposes, the need for the voice utterances to be transmitted over a network introduces security concerns.…”
Section: Introductionmentioning
confidence: 99%
“…This example is derived based on a speech recognition application [7]. There are two source nodes, s0 and s1, each streaming a 1s utterance of 8-bit, 4-kHz speech request (referred as a task with 4000 bytes data size) to one of the four processing nodes, n0, n1, n2, and n3.…”
Section: An Illustrative Examplementioning
confidence: 99%
“…However, when the overhead messages occupy a large amount of network bandwidth (at TC interval of 0.2s), schedulers are unable to predict the accurate transmission time at the target processing node as in Eqn. (7). The scheduling results are significantly impacted, especially for greedy and probabilistic schedulers, which result in a dramatic drop of the task completion rates.…”
Section: Effect Of Varying Topology Control Message Intervalmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, servers provide the necessary security of a system that customers work on, for instance in some organizations some systems provide some level of safety for using the database [8].…”
Section: Computer Servermentioning
confidence: 99%