Sciweavers

2947 search results - page 531 / 590
» The timely token protocol
Sort
View
TWC
2011
291views more  TWC 2011»
14 years 6 months ago
On Optimal Cooperator Selection Policies for Multi-Hop Ad Hoc Networks
Abstract—In this paper we consider wireless cooperative multihop networks, where nodes that have decoded the message at the previous hop cooperate in the transmission toward the ...
Michele Rossi, Cristiano Tapparello, Stefano Tomas...
79
Voted
INTERSPEECH
2010
14 years 6 months ago
Approaching human listener accuracy with modern speaker verification
Being able to recognize people from their voice is a natural ability that we take for granted. Recent advances have shown significant improvement in automatic speaker recognition ...
Ville Hautamäki, Tomi Kinnunen, Mohaddeseh No...
JCIT
2010
162views more  JCIT 2010»
14 years 6 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
TDSC
2010
160views more  TDSC 2010»
14 years 6 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
TELSYS
2010
154views more  TELSYS 2010»
14 years 6 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert