Sciweavers

6796 search results - page 1068 / 1360
» Java for Embedded Systems
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 11 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
TASLP
2010
97views more  TASLP 2010»
14 years 10 months ago
Hierarchical Bayesian Language Models for Conversational Speech Recognition
Traditional n-gram language models are widely used in state-of-the-art large vocabulary speech recognition systems. This simple model suffers from some limitations, such as overfi...
Songfang Huang, Steve Renals
121
Voted
TITB
2010
122views Education» more  TITB 2010»
14 years 10 months ago
Motion-tolerant magnetic earring sensor and wireless earpiece for wearable photoplethysmography
This paper addresses the design considerations and critical evaluation of a novel embodiment for wearable photoplethysmography (PPG) comprising a magnetic earring sensor and wirele...
Ming-Zher Poh, Nicholas C. Swenson, Rosalind W. Pi...
AAAI
2011
14 years 4 months ago
Reasoning About General Games Described in GDL-II
Recently the general Game Description Language (GDL) has been extended so as to cover arbitrary games with incomplete/imperfect information. Learning—without human interventionâ...
Stephan Schiffel, Michael Thielscher
ANCS
2005
ACM
15 years 9 months ago
Framework for supporting multi-service edge packet processing on network processors
Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-servic...
Arun Raghunath, Aaron R. Kunze, Erik J. Johnson, V...
« Prev « First page 1068 / 1360 Last » Next »