Sciweavers

4564 search results - page 655 / 913
» Data Integration Using ID-Logic
Sort
View
137
Voted
IJNM
2008
112views more  IJNM 2008»
15 years 2 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
130
Voted
PVLDB
2010
151views more  PVLDB 2010»
15 years 28 days ago
Database Compression on Graphics Processors
Query co-processing on graphics processors (GPUs) has become an effective means to improve the performance of main memory databases. However, this co-processing requires the data ...
Wenbin Fang, Bingsheng He, Qiong Luo
ICASSP
2011
IEEE
14 years 6 months ago
Hilbert envelope based features for robust speaker identification under reverberant mismatched conditions
It is well known that MFCC based speaker identification (SID) systems easily break down under mismatched training and test conditions. One such mismatch occurs when a SID system ...
Seyed Omid Sadjadi, John H. L. Hansen
ACC
2011
65views more  ACC 2011»
14 years 2 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
132
Voted
CEC
2011
IEEE
14 years 2 months ago
Inferring transcriptional regulators for sets of co-expressed genes by multi-objective evolutionary optimization
Abstract—Higher organisms are able to respond to continuously changing external conditions by transducing cellular signals into specific regulatory programs, which control gene ...
Adrian Schröder, Clemens Wrzodek, Johannes Wo...