In this article, we describe a new architecture providing the access control service in both ATM and IPover-ATM networks. This architecture is based on agents distributed in netwo...
A method is presented which analyses the audio speech data of voice calls and calculates an "acoustic fingerprint". The audio data of the voice calls are compared with e...