Sciweavers

18 search results - page 4 / 4
» adt 2010
Sort
View
ADT
2010
13 years 5 months ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
INTERSPEECH
2010
12 years 11 months ago
Audio-visual anticipatory coarticulation modeling by human and machine
The phenomenon of anticipatory coarticulation provides a basis for the observed asynchrony between the acoustic and visual onsets of phones in certain linguistic contexts. This ty...
Louis H. Terry, Karen Livescu, Janet B. Pierrehumb...
CCGRID
2010
IEEE
13 years 6 months ago
High Performance Data Transfer in Grid Environment Using GridFTP over InfiniBand
GridFTP, designed by using the Globus XIO framework, is one of the most popular methods for performing data transfers in the Grid environment. But the performance of GridFTP in WA...
Hari Subramoni, Ping Lai, Rajkumar Kettimuthu, Dha...