Sciweavers

9 search results - page 1 / 2
» Beyond Doddington menagerie, a first step towards
Sort
View
ICASSP
2010
IEEE
13 years 6 months ago
Beyond Doddington menagerie, a first step towards
During the last decade, speaker verification systems have shown significant progress and have reached a level of performance and accuracy that support their utilization in pract...
Juliette Kahn, Solange Rossato, Jean-Franço...
CVPR
2010
IEEE
14 years 2 months ago
Beyond Trees: MRF Inference via Outer-Planar Decomposition
Maximum a posteriori (MAP) inference in Markov Random Fields (MRFs) is an NP-hard problem, and thus research has focussed on either finding efficiently solvable subclasses (e.g. t...
Dhruv Batra, Andrew Gallagher, Devi Parikh, Tsuhan...
INFOCOM
2000
IEEE
13 years 10 months ago
Power Controlled Multiple Access (PCMA) in Wireless Communication Networks
—We address the issue of power-controlled shared channel access in future wireless networks supporting packetized data traffic, beyond the voice-oriented continuous traffic prima...
Nicholas Bambos, Sunil Kandukuri
DEXAW
2009
IEEE
129views Database» more  DEXAW 2009»
13 years 9 months ago
Towards a Generic Process for Security Pattern Integration
Abstract--Interdependencies between different security patterns can influence the properties of a particular pattern when applied in conjunction with other patterns. The resulting ...
Andreas Fuchs, Sigrid Gürgens, Carsten Rudolp...
MOBISYS
2005
ACM
14 years 5 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica