Sciweavers

4218 search results - page 247 / 844
» Complete sets of cooperations
Sort
View
79
Voted
CISIS
2009
IEEE
15 years 7 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ICASSP
2009
IEEE
15 years 7 months ago
Unsupervised pronunciation validation
This paper addresses selecting between candidate pronunciations for out-of-vocabulary words in speech processing tasks. We introduce a simple, unsupervised method that outperforms...
Christopher M. White, Abhinav Sethy, Bhuvana Ramab...
87
Voted
ICTAI
2009
IEEE
15 years 7 months ago
Collaborative Concept Learning: Non Individualistic vs Individualistic Agents
This article addresses collaborative learning in a multiagent system: each agent revises incrementally its beliefs B (a concept representation) to keep it consistent with the whol...
Gauvain Bourgne, Dominique Bouthinon, Amal El Fall...
GLOBECOM
2008
IEEE
15 years 7 months ago
Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver
—We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading cha...
Michael R. Souryal, Huiqing You
HICSS
2008
IEEE
116views Biometrics» more  HICSS 2008»
15 years 7 months ago
Virtual Communities for Innovations: Users' Requirements for the Development of an Academic SAP User Group
This Research in Progress paper analyses users’ requirements for the development of a Virtual Community (VC) for the academic SAP UCC (University Competence Center) User Group. ...
Winfried Ebner, Ulrich Bretschneider, Jan Marco Le...