Sciweavers

244 search results - page 44 / 49
» A Model of Components with Non-regular Protocols
Sort
View
LSO
2001
Springer
15 years 1 months ago
Knowledge Elicitation through Web-Based Data Mining Services
Knowledge is a vital component for organisational growth and data mining provides the technological basis for automated knowledge elicitation from data sources. The emergence of Ap...
Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zas...
MM
1995
ACM
173views Multimedia» more  MM 1995»
15 years 1 months ago
An Application Level Video Gateway
The current model for multicast transmission of video over the Internet assumes that a fixed average bandwidth is uniformly present throughout the network. Consequently, sources ...
Elan Amir, Steven McCanne, Hui Zhang
NETWORKING
2000
14 years 11 months ago
A Scheme for Time-Dependent Resource Reservation in QoS-Enabled IP Networks
A number of distributed applications require communication services with Quality of Service (QoS) guarantees. The QoS provisioning issue in the Internet has been addressed by the I...
Roberto Canonico, Simon Pietro Romano, Mauro Selli...
ESORICS
2010
Springer
14 years 10 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
81
Voted
ICASSP
2010
IEEE
14 years 9 months ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...