Sciweavers

1513 search results - page 20 / 303
» Fibonacci Correction Networks
Sort
View
LREC
2010
173views Education» more  LREC 2010»
15 years 3 months ago
Transcriber Driving Strategies for Transcription Aid System
Speech recognition technology suffers from a lack of robustness which limits its usability for fully automated speech-to-text transcription, and manual correction is generally req...
Grégory Senay, Georges Linares, Benjamin Le...
ICCCN
2008
IEEE
15 years 8 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
89
Voted
E2EMON
2006
IEEE
15 years 8 months ago
Implementation and Evaluation of a Protocol for Detecting Network-Wide Threshold Crossing Alerts
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
Fetahi Wuhib, Rolf Stadler, Alexander Clemm
SRDS
2007
IEEE
15 years 8 months ago
RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks
In this paper, we propose a novel ReliAble ProbabIlistic Dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and sel...
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc S...
CORR
2011
Springer
212views Education» more  CORR 2011»
14 years 9 months ago
Combining Neural Networks for Skin Detection
Two types of combining strategies were evaluated namely combining skin features and combining skin classifiers. Several combining rules were applied where the outputs of the skin ...
Chelsia Amy Doukim, Jamal Ahmad Dargham, Ali Cheki...