Sciweavers

4870 search results - page 966 / 974
» Challenges of component-based development
Sort
View
TWC
2010
14 years 9 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
ICASSP
2011
IEEE
14 years 6 months ago
Unsupervised determination of efficient Korean LVCSR units using a Bayesian Dirichlet process model
Korean is an agglutinative language that does not have explicit word boundaries. It is also a highly inflective language that exhibits severe coarticulation effects. These charac...
Sakriani Sakti, Andrew M. Finch, Ryosuke Isotani, ...
138
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Belief theoretic methods for soft and hard data fusion
In many contexts, one is confronted with the problem of extracting information from large amounts of different types soft data (e.g., text) and hard data (from e.g., physics-based...
Thanuka Wickramarathne, Kamal Premaratne, Manohar ...
ICASSP
2011
IEEE
14 years 6 months ago
Real-time conjugate gradients for online fMRI classification
Real-time functional magnetic resonance imaging (rtfMRI) enables classification of brain activity during data collection thus making inference results accessible to both the subj...
Hao Xu, Yongxin Taylor Xi, Ray Lee, Peter J. Ramad...
INFOCOM
2011
IEEE
14 years 6 months ago
Continuous multi-dimensional top-k query processing in sensor networks
—Top-k query has long been an important topic in many fields of computer science. Efficient implementation of the top-k queries is the key for information searching. With the n...
Hongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang,...