Sciweavers

5409 search results - page 1075 / 1082
» A performance study of client-broker-server systems
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 8 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
SPEECH
2008
97views more  SPEECH 2008»
13 years 8 months ago
A new approach for the adaptation of HMMs to reverberation and background noise
Looking at practical application scenarios of speech recognition systems several distortion effects exist that have a major influence on the speech signal and can considerably det...
Hans-Günter Hirsch, Harald Finster
IJSN
2007
129views more  IJSN 2007»
13 years 8 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
TIP
2008
144views more  TIP 2008»
13 years 8 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras
JCNS
2007
77views more  JCNS 2007»
13 years 8 months ago
Threshold fatigue and information transfer
Neurons in vivo must process sensory information in the presence of significant noise. It is thus plausible to assume that neural systems have developed mechanisms to reduce this n...
Maurice J. Chacron, Benjamin Lindner, André...
« Prev « First page 1075 / 1082 Last » Next »