Sciweavers

897 search results - page 24 / 180
» promise 2010
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 4 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
INTERSPEECH
2010
14 years 4 months ago
On the potential of glottal signatures for speaker recognition
Most of current speaker recognition systems are based on features extracted from the magnitude spectrum of speech. However the excitation signal produced by the glottis is expecte...
Thomas Drugman, Thierry Dutoit
INTERSPEECH
2010
14 years 4 months ago
A spectral LF model based approach to voice source parameterisation
This paper presents a new method of extracting LF model based parameters using a spectral model matching approach. Strategies are described for overcoming some of the known diffic...
John Kane, Mark Kane, Christer Gobl
JDCTA
2010
176views more  JDCTA 2010»
14 years 4 months ago
A Context-Aware Framework using Ontology for Smart Phone Platform
Context-awareness has been considered as promising topic in pervasive computing area, but a review of the existing approaches shown that developing diverse application services in...
Yun Her, Su-Kyoung Kim, YoungTaek Jin
JSCIC
2010
57views more  JSCIC 2010»
14 years 4 months ago
A Proof of the Stability of the Spectral Difference Method for All Orders of Accuracy
While second order methods for computational simulations of fluid flow provide the basis of widely used commercial software, there is a need for higher order methods for more accur...
Antony Jameson