Sciweavers

2120 search results - page 322 / 424
» Mapping the Gnutella Network
Sort
View
121
Voted
IJCNN
2006
IEEE
15 years 6 months ago
A Connectionist Approach to Speech Understanding
— This paper argues that connectionist systems are a good approach to implement a speech understanding computational model. In this direction, we propose SUM, a Speech Understand...
Daniel Nehme Müller, Mozart Lemos de Siqueira...
ISCAS
2006
IEEE
120views Hardware» more  ISCAS 2006»
15 years 6 months ago
Fast bit permutation unit for media enhanced microprocessors
— Bit and subword permutations are useful in many multimedia and cryptographic applications. New shift and permute instructions have been added to the instruction set of general-...
Giorgos Dimitrakopoulos, Christos Mavrokefalidis, ...
112
Voted
ACCV
2006
Springer
15 years 6 months ago
Tracking Targets Via Particle Based Belief Propagation
We first formulate multiple targets tracking problem in a dynamic Markov network(DMN)which is derived from a MRFs for joint target state and a binary process for occlusion of dual...
Jianru Xue, Nanning Zheng, Xiaopin Zhong
ADAEUROPE
2006
Springer
15 years 6 months ago
Interchangeable Scheduling Policies in Real-Time Middleware for Distribution
When a middleware layer is designed for providing semi-transparent distribution facilities to real-time applications, a trade-off must be made between the expressiveness and contro...
Juan López Campos, J. Javier Gutiérr...
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
15 years 6 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood