Sciweavers

20745 search results - page 4044 / 4149
» Computer graphics for all
Sort
View
ACSW
2006
14 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
BIOCOMP
2006
14 years 11 months ago
Membrane Remodeling and Diffusion of Cytochrome C from a Geometrically Idealized Mitochondrial Crista
In healthy eukaryotic cells, mitochondria have an outer membrane that surrounds a complex inner membrane structure [7,8]. Cytochrome c is found in the space between the two membra...
John Manor, Peter Salamon, James Nulton, Joseph Ma...
CSREASAM
2006
14 years 11 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
FLAIRS
2004
14 years 11 months ago
Recurrent Neural Networks and Pitch Representations for Music Tasks
We present results from experiments in using several pitch representations for jazz-oriented musical tasks performed by a recurrent neural network. We have run experiments with se...
Judy A. Franklin
ACL
2003
14 years 11 months ago
Generalized Algorithms for Constructing Statistical Language Models
Recent text and speech processing applications such as speech mining raise new and more general problems related to the construction of language models. We present and describe in...
Cyril Allauzen, Mehryar Mohri, Brian Roark
« Prev « First page 4044 / 4149 Last » Next »