Sciweavers

9210 search results - page 1636 / 1842
» Analyzing Real-Time Systems
Sort
View
WWW
2011
ACM
13 years 5 months ago
Choreography conformance via synchronizability
Choreography analysis has been a crucial problem in service oriented computing. Interactions among services involve message exchanges across organizational boundaries in a distrib...
Samik Basu, Tevfik Bultan
INTERSPEECH
2010
13 years 5 months ago
Learning from human errors: prediction of phoneme confusions based on modified ASR training
In an attempt to improve models of human perception, the recognition of phonemes in nonsense utterances was predicted with automatic speech recognition (ASR) in order to analyze i...
Bernd T. Meyer, Birger Kollmeier
JDCTA
2010
172views more  JDCTA 2010»
13 years 5 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
JMLR
2010
185views more  JMLR 2010»
13 years 5 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
JSAC
2010
170views more  JSAC 2010»
13 years 5 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
« Prev « First page 1636 / 1842 Last » Next »