Sciweavers

377 search results - page 43 / 76
» Constrained Codes as Networks of Relations
Sort
View
ICMCS
2009
IEEE
85views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Text-independent compressed domain speaker verification for digital communication networks call monitoring
In this paper we present a text-independent automatic speaker verification system that works in the compressed domain using GSM AMR coded speech. While traditional approaches proc...
Matteo Petracca, Antonio Servetti, Juan Carlos De ...
JVCIR
2006
280views more  JVCIR 2006»
13 years 7 months ago
Error resiliency schemes in H.264/AVC standard
Real-time transmission of video data in network environments, such as wireless and Internet, is a challenging task, as it requires high compression efficiency and network friendly...
Sunil Kumar, Liyang Xu, Mrinal K. Mandal, Sethuram...
ACSC
2008
IEEE
14 years 2 months ago
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
Abstract— Hybrid Wireless Mesh Networks are a combination of mobile ad hoc networks and infrastructure wireless mesh networks, consisting of two types of nodes: Mobile Mesh Clien...
Stephan Mir, Asad Amir Pirzada, Marius Portmann
SASN
2004
ACM
14 years 1 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 8 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal