Sciweavers

1336 search results - page 195 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
130
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Feature normalization for speaker verification in room reverberation
The performance of a typical speaker verification system degrades significantly in reverberant environments. This degradation is partly due to the conventional feature extractio...
Sriram Ganapathy, Jason W. Pelecanos, Mohamed Kama...
162
Voted
ECOWS
2007
Springer
15 years 9 months ago
Specifying and Monitoring Composite Events for Semantic Web Services
Execution monitoring of complex web service process models is critical for effective management and control of web services based systems. During the composite process model execu...
Roman Vaculín, Katia P. Sycara
ICST
2008
IEEE
15 years 10 months ago
Designing and Building a Software Test Organization
–Abstract for conference - preliminary Model-Based Testing: Models for Test Cases Jan Tretmans, Embedded Systems Institute, Eindhoven : Systematic testing of software plays an im...
Bruce Benton
138
Voted
ICDE
2009
IEEE
155views Database» more  ICDE 2009»
15 years 10 months ago
Join Optimization of Information Extraction Output: Quality Matters!
— Information extraction (IE) systems are trained to extract specific relations from text databases. Real-world applications often require that the output of multiple IE systems...
Alpa Jain, Panagiotis G. Ipeirotis, AnHai Doan, Lu...
108
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh