Sciweavers

152 search results - page 15 / 31
» Copyright Issues for MKM
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
Performance analysis for blind identification of acoustic channels
: © Performance Analysis for Blind Identification of Acoustic Channels Majid Fozunbal HP Laboratories HPL-2009-333 Audio, acoustic systems, blind identification, dereverberation, ...
Majid Fozunbal
EAAI
2010
91views more  EAAI 2010»
13 years 7 months ago
A framework for on-line trend extraction and fault diagnosis
: Qualitative trend analysis (QTA) is a process-history-based data-driven technique that works by extracting important features (trends) from the measured signals and evaluating th...
Mano Ram Maurya, Praveen K. Paritosh, Raghunathan ...
COMCOM
2007
103views more  COMCOM 2007»
13 years 7 months ago
Inter-autonomous system provisioning for end-to-end bandwidth guarantees
This paper addresses the issue of provisioning end-to-end bandwidth guarantees across multiple Autonomous Systems (ASes). We first review a cascaded model for negotiating and est...
Kin-Hon Ho, Michael P. Howarth, Ning Wang, George ...
ISI
2008
Springer
13 years 7 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
JTAER
2006
143views more  JTAER 2006»
13 years 7 months ago
P2P's Significance for eBusiness: Towards a Research Agenda
Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application func...
Roger Clarke