Sciweavers

3305 search results - page 137 / 661
» Can we Rely on SQL
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Brute-forcing hierarchical functionals for paralinguistics: A waste of feature space?
While the ”‘quasi-state-of-the-art”’ towards acoustic emotion recognition relies on multivariate time-series analysis of e.g. pitch, energy, or MFCC by statistical functio...
Björn Schuller, Matthias Wimmer, Lorenz Moese...
BIOWIRE
2007
Springer
14 years 4 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...
CONEXT
2006
ACM
14 years 4 months ago
Virtual networks under attack: disrupting internet coordinate systems
Internet coordinate-based systems are poised to become an important service to support overlay construction and topology-aware applications. Indeed, through network distance embed...
Mohamed Ali Kâafar, Laurent Mathy, Thierry T...
PAM
2005
Springer
14 years 3 months ago
Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology
At present, link layer topology discovery methodologies rely on protocols that are not universally available, such as SNMP. Such methodologies can only be applied to a subset of al...
Shane Alcock, Anthony McGregor, Richard Nelson
MOBICOM
2004
ACM
14 years 3 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon