Sciweavers

11217 search results - page 2165 / 2244
» Network Coding for Wireless Networks
Sort
View
ICASSP
2007
IEEE
15 years 4 months ago
Eigentongue Feature Extraction for an Ultrasound-Based Silent Speech Interface
The article compares two approaches to the description of ultrasound vocal tract images for application in a “silent speech interface,” one based on tongue contour modeling, a...
Thomas Hueber, Guido Aversano, Gérard Choll...
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 4 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
MSS
2007
IEEE
86views Hardware» more  MSS 2007»
15 years 4 months ago
RAIF: Redundant Array of Independent Filesystems
Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems either do not suppo...
Nikolai Joukov, Arun M. Krishnakumar, Chaitanya Pa...
ATAL
2007
Springer
15 years 4 months ago
A formal model for situated semantic alignment
Ontology matching is currently a key technology to achieve the semantic alignment of ontological entities used by knowledge-based applications, and therefore to enable their inter...
Manuel Atencia, W. Marco Schorlemmer
ESORICS
2007
Springer
15 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
« Prev « First page 2165 / 2244 Last » Next »