Sciweavers

95 search results - page 16 / 19
» jdcta 2010
Sort
View
JDCTA
2010
130views more  JDCTA 2010»
13 years 1 months ago
A Search Algorithm for Clusters in a Network or Graph
A novel breadth-first based structural clustering method for graphs is proposed. Clustering is an important task for analyzing complex networks such as biological networks, World ...
Dongming Chen, Jing Wang, Xiaodong Chen, Xiaowei X...
JDCTA
2010
144views more  JDCTA 2010»
13 years 1 months ago
Research on SVDD Applied in Speaker Verification
In tradition probability statistics model, speaker verification threshold is instability in different test situations. A novel speaker verification method based on Support Vector ...
Yuhuan Zhou, Xiongwei Zhang, Jinming Wang, Yong Go...
JDCTA
2010
458views more  JDCTA 2010»
13 years 1 months ago
The Impact of Debt Financing on Firm Investment Behavior: Evidence from China
This study examines the impacts of debt financing on the firms' investment decisions by employing the method of the multiple linear regression on the data from 2006-2008 of 6...
Jiming Li, Chengqin Shi, ZhaoHua Wang
JDCTA
2010
95views more  JDCTA 2010»
13 years 1 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang
JDCTA
2010
172views more  JDCTA 2010»
13 years 1 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh