Sciweavers

384 search results - page 38 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
JNW
2008
115views more  JNW 2008»
15 years 1 months ago
On the Interaction Between Multiple Paths and Wireless Mesh Networks Scheduler Approaches
Multi-path routing allows building and use of multiple paths for routing between a source-destination pair. This paper investigates the problem of selecting multiple routing paths ...
Valeria Loscrì
CSL
2010
Springer
15 years 16 days ago
Voice activity detection based on statistical models and machine learning approaches
The voice activity detectors (VADs) based on statistical models have shown impressive performances especially when fairly precise statistical models are employed. Moreover, the ac...
Jong Won Shin, Joon-Hyuk Chang, Nam Soo Kim
BMCBI
2008
171views more  BMCBI 2008»
15 years 2 months ago
A general approach to simultaneous model fitting and variable elimination in response models for biological data with many more
Background: With the advent of high throughput biotechnology data acquisition platforms such as micro arrays, SNP chips and mass spectrometers, data sets with many more variables ...
Harri T. Kiiveri
VLDB
2001
ACM
94views Database» more  VLDB 2001»
15 years 6 months ago
FeedbackBypass: A New Approach to Interactive Similarity Query Processing
In recent years, several methods have been proposed for implementing interactive similarity queries on multimedia databases. Common to all these methods is the idea to exploit use...
Ilaria Bartolini, Paolo Ciaccia, Florian Waas
160
Voted
TON
2010
167views more  TON 2010»
14 years 8 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...