Sciweavers

465 search results - page 62 / 93
» Rapid Development of Application-Specific Network Performanc...
Sort
View
IEICET
2007
83views more  IEICET 2007»
14 years 9 months ago
A MFCC-Based CELP Speech Coder for Server-Based Speech Recognition in Network Environments
Existing standard speech coders can provide speech communication of high quality while they degrade the performance of speech recognition systems that use the reconstructed speech...
Jae Sam Yoon, Gil Ho Lee, Hong Kook Kim
DBSEC
2006
131views Database» more  DBSEC 2006»
14 years 11 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
IPSN
2010
Springer
15 years 4 months ago
Consensus-based distributed linear support vector machines
This paper develops algorithms to train linear support vector machines (SVMs) when training data are distributed across different nodes and their communication to a centralized no...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
IFIP
2007
Springer
15 years 3 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...
INFOCOM
2006
IEEE
15 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...