Sciweavers

42 search results - page 3 / 9
» Automatically detecting asymmetric running using time and fr...
Sort
View
JCIT
2008
124views more  JCIT 2008»
14 years 9 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
COMPSAC
2010
IEEE
14 years 7 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 8 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ICIAP
2003
ACM
15 years 10 months ago
A real-time text-independent speaker identification system
The paper presents a real-time speaker identification system based on the analysis of the audio track of a video stream. The system has been employed in the context of automatic v...
Luigi P. Cordella, Pasquale Foggia, Carlo Sansone,...
USS
2010
14 years 7 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...