Sciweavers

5903 search results - page 1054 / 1181
» Signal Processing
Sort
View
127
Voted
LCN
2005
IEEE
15 years 10 months ago
Filtering of Shrew DDoS Attacks in Frequency Domain
—The shrew Distributed Denial of Service (DDoS) attacks are periodic, bursty, and stealthy in nature. They are also known as Reduction of Quality (RoQ) attacks. Such attacks coul...
Yu Chen, Kai Hwang, Yu-Kwong Kwok
RTCSA
2005
IEEE
15 years 10 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
DCOSS
2005
Springer
15 years 10 months ago
Macro-programming Wireless Sensor Networks Using Kairos
The literature on programming sensor networks has focused so far on g higher-level abstractions for expressing local node behavior. Kairos is a natural next step in sensor network ...
Ramakrishna Gummadi, Omprakash Gnawali, Ramesh Gov...
127
Voted
GECCO
2005
Springer
151views Optimization» more  GECCO 2005»
15 years 10 months ago
The application of antigenic search techniques to time series forecasting
Time series have been a major topic of interest and analysis for hundreds of years, with forecasting a central problem. A large body of analysis techniques has been developed, par...
Ian Nunn, Tony White
ISMIR
2005
Springer
182views Music» more  ISMIR 2005»
15 years 10 months ago
The Mel-Frequency Cepstral Coefficients in the Context of Singer Identification
The singing voice is the oldest and most complex musical instrument. A familiar singer’s voice is easily recognizable for humans, even when hearing a song for the first time. O...
Annamaria Mesaros, Jaakko Astola
« Prev « First page 1054 / 1181 Last » Next »