Sciweavers

663 search results - page 110 / 133
» Certifying Data from Multiple Sources
Sort
View
144
Voted
ICMI
2005
Springer
215views Biometrics» more  ICMI 2005»
15 years 8 months ago
Multimodal multispeaker probabilistic tracking in meetings
Tracking speakers in multiparty conversations constitutes a fundamental task for automatic meeting analysis. In this paper, we present a probabilistic approach to jointly track th...
Daniel Gatica-Perez, Guillaume Lathoud, Jean-Marc ...
158
Voted
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 6 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
ISCC
1999
IEEE
127views Communications» more  ISCC 1999»
15 years 6 months ago
A Modular Location-Aware Service and Application Platform
Location-Aware applications for supporting the mobile user as well as logistics of movable objects have proven significant relevance for future telecommunication and computing. Ba...
Tom Pfeifer, Radu Popescu-Zeletin
120
Voted
SPRINGSIM
2007
15 years 3 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 6 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...