Sciweavers

2875 search results - page 312 / 575
» Using separation of concerns for embedded systems design
Sort
View
CCS
2009
ACM
15 years 12 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
140
Voted
CIARP
2004
Springer
15 years 10 months ago
Speaker Verification Using Coded Speech
Abstract. The implementation of a pseudo text-independent Speaker Verification system is described. This system was designed to use only information extracted directly from the cod...
Antonio Moreno-Daniel, Biing-Hwang Juang, Juan Art...
CSE
2009
IEEE
15 years 11 months ago
Information Retrieval in Wikis Using an Ontology
This article addresses a question regarding relevant information in a social media such as a wiki that can contain huge amount of text, written in slang or in natural language, wi...
Carlos Miguel Tobar, Alessandro Santos Germer, Jua...
194
Voted
GPC
2007
Springer
15 years 9 months ago
Image Streaming and Recognition for Vehicle Location Tracking Using Mobile Devices
The image of a license plate is scanned by the camera attached to a mobile PDA device and the numbers on the plate are detected by the image processing parts in the proposed Mobile...
Jin-Suk Kang, Taikyeong T. Jeong, Sang Hyun Oh, Me...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 10 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...