Sciweavers

2361 search results - page 235 / 473
» Embedded Systems - Challenges and Work Directions
Sort
View
148
Voted
ACSW
2006
15 years 6 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
ENGL
2006
135views more  ENGL 2006»
15 years 5 months ago
An Integral Plus States Adaptive Neural Control of Aerobic Continuous Stirred Tank Reactor
A direct adaptive neural network control system with and without integral action term is designed for the general class of continuous biological fermentation processes. The control...
Ieroham S. Baruch, Petia Georgieva, Josefina Barre...
109
Voted
ICMCS
2009
IEEE
85views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Text-independent compressed domain speaker verification for digital communication networks call monitoring
In this paper we present a text-independent automatic speaker verification system that works in the compressed domain using GSM AMR coded speech. While traditional approaches proc...
Matteo Petracca, Antonio Servetti, Juan Carlos De ...
EMNLP
2011
14 years 4 months ago
Identifying Relations for Open Information Extraction
Open Information Extraction (IE) is the task of extracting assertions from massive corpora without requiring a pre-specified vocabulary. This paper shows that the output of state...
Anthony Fader, Stephen Soderland, Oren Etzioni
IPPS
2006
IEEE
15 years 11 months ago
A design of overlay anonymous multicast protocol
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Xiaomei Liu, Wenjun Gu, Dong Xuan, Yunhao...