Sciweavers

13180 search results - page 2428 / 2636
» Network Models
Sort
View
ICASSP
2007
IEEE
15 years 10 months ago
Eigentongue Feature Extraction for an Ultrasound-Based Silent Speech Interface
The article compares two approaches to the description of ultrasound vocal tract images for application in a “silent speech interface,” one based on tongue contour modeling, a...
Thomas Hueber, Guido Aversano, Gérard Choll...
125
Voted
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 10 months ago
A Real-Time Hardware-Based Scheduler For Next-Generation Optical Burst Switches
– Optical burst switching (OBS) is a promising technique for next-generation optical switching networks. In traditional OBS, an entire burst is discarded when all output waveleng...
Muhammad T. Anan, Ghulam Chaudhry
116
Voted
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 10 months ago
FP/FIFO Scheduling: Deterministic Versus Probabilistic QoS Guarantees and P-Schedulability
Abstract—In this paper, we focus on applications with quantitative QoS (Quality of Service) requirements in their end-toend response time. Two types of quantitative QoS garantees...
Leïla Azouz Saïdane, Skander Azzaz, Stev...
112
Voted
ICC
2007
IEEE
15 years 10 months ago
Link Error Prediction in Wireless Communication Systems with Quality Based Power Control
— The quality of end-to-end services over wireless communication networks highly depends on the error characteristics of the wireless links. By utilizing the link error character...
Wolfgang Karner, Olivia Nemethova, Markus Rupp
108
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 10 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
« Prev « First page 2428 / 2636 Last » Next »