Sciweavers

1026 search results - page 149 / 206
» The least-mean-magnitude-phase algorithm with applications t...
Sort
View
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
14 years 9 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
ASSETS
2009
ACM
14 years 7 months ago
VocaliD: personalizing text-to-speech synthesis for individuals with severe speech impairment
Speech synthesis options on assistive communication devices are very limited and do not reflect the user’s vocal quality or personality. Previous work suggests that speakers wit...
Camil Jreige, Rupal Patel, H. Timothy Bunnell
GLOBECOM
2010
IEEE
14 years 7 months ago
Spectrum Aware Opportunistic Routing in Cognitive Radio Networks
Cognitive radio (CR) emerges as a key technology to enhance spectrum efficiency and thus creates opportunistic transmissions over links. Supporting the routing function on top of n...
Shih-Chun Lin, Kwang-Cheng Chen
SIGCOMM
2006
ACM
15 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
SENSYS
2005
ACM
15 years 3 months ago
Data collection, storage, and retrieval with an underwater sensor network
In this paper we present a novel platform for underwater sensor networks to be used for long-term monitoring of coral reefs and fisheries. The sensor network consists of static a...
Iuliu Vasilescu, Keith Kotay, Daniela Rus, Matthew...