Sciweavers

1089 search results - page 95 / 218
» Performance measurement of networks: towards a non-financial...
Sort
View
WISEC
2010
ACM
15 years 6 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
ICASSP
2009
IEEE
15 years 6 months ago
A study of pronunciation verification in a speech therapy application
Techniques are presented for detecting phoneme level mispronunciations in utterances obtained from a population of impaired children speakers. The intended application of these ap...
Shou-Chun Yin, Richard Rose, Oscar Saz, Eduardo Ll...
NOSSDAV
2005
Springer
15 years 4 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
ISQED
2007
IEEE
109views Hardware» more  ISQED 2007»
15 years 5 months ago
Virtual Channels Planning for Networks-on-Chip
The virtual channel flow control (VCFC) provides an efficient implementation for on-chip networks. However, allocating the virtual channels (VCs) uniformly results in a waste of a...
Ting-Chun Huang, Ümit Y. Ogras, Radu Marcules...
COMPCON
1994
IEEE
15 years 3 months ago
AMULET1: A Micropipelined ARM
A fully asynchronous implementation of the ARM microprocessor has been developed in order to investigate the potential of asynchronous logic for low-power applications. The work d...
Stephen B. Furber, P. Day, Jim D. Garside, N. C. P...