Sciweavers

367 search results - page 34 / 74
» Performance Analysis and Evaluation of VDSL2 Systems: Band-P...
Sort
View
ICIAR
2010
Springer
15 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
GLOBECOM
2009
IEEE
15 years 1 months ago
Analysis of Asynchronous Multi-Packet Reception in 802.11 Distributed Wireless Networks
— This paper proposes a mathematical framework for evaluating the throughput of an 802.11 Distributed Wireless Network (DWN) when the system allows Multi-Packet Reception (MPR) i...
Fulvio Babich, Massimiliano Comisso
IPTPS
2005
Springer
15 years 3 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
INFOCOM
2009
IEEE
15 years 4 months ago
Routing Fairness in Chord: Analysis and Enhancement
—In Peer-to-Peer (P2P) systems where stored objects are small, routing dominates the cost of publishing and retrieving an object. In such systems, the issue of fairly balancing t...
Rubén Cuevas Rumín, Manuel Urue&ntil...
ICASSP
2008
IEEE
15 years 4 months ago
Robust speaker identification using auditory features and computational auditory scene analysis
The performance of speaker recognition systems drop significantly under noisy conditions. To improve robustness, we have recently proposed novel auditory features and a robust spe...
Yang Shao, DeLiang Wang