Sciweavers

16206 search results - page 3084 / 3242
» At Issue
Sort
View
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 2 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CORR
2010
Springer
162views Education» more  CORR 2010»
15 years 2 months ago
Power Allocation Games in Wireless Networks of Multi-antenna Terminals
We consider wireless networks that can be modeled by multiple access channels in which all the terminals are equipped with multiple antennas. The propagation model used to account...
Elena Veronica Belmega, Samson Lasaulce, Mé...
CORR
2008
Springer
139views Education» more  CORR 2008»
15 years 2 months ago
Exact two-terminal reliability of some directed networks
Abstract-- The calculation of network reliability in a probabilistic context has long been an issue of practical and academic importance. Conventional approaches (determination of ...
Christian Tanguy
CSL
2010
Springer
15 years 2 months ago
Discriminative training of HMMs for automatic speech recognition: A survey
Recently, discriminative training (DT) methods have achieved tremendous progress in automatic speech recognition (ASR). In this survey article, all mainstream DT methods in speech...
Hui Jiang
99
Voted
CSCL
2008
106views more  CSCL 2008»
15 years 2 months ago
Operationalizing macro-scripts in CSCL technological settings
: This paper presents a conceptual analysis of the technological dimensions related to the operationalization of CSCL macro-scripts. CSCL scripts are activity models that aim at en...
Pierre Tchounikine
« Prev « First page 3084 / 3242 Last » Next »