— Multimedia applications communicating over a next generation VPN architecture that allows selective encryption can leverage the security properties of a VPN with its performanc...
In this paper a speaker adaptation methodology is proposed, which first automatically determines a number of speaker clusters in the training material, then estimates the paramete...
Hitherto, the major challenge to sign language recognition is how to develop approaches that scale well with increasing vocabulary size. In this paper we present an approach to la...
A Partial Order and partial reliable Connection (POC) is an end-to-end transport connection authorized to deliver objects in an order that can differ from the transmitted one. Such...
Luis Rojas-Cardenas, Emmanuel Chaput, Laurent Dair...
There are many different approaches to elicit requirements each having its strengths and weaknesses. Hence, some approaches may be ore suitable to one domain then another. Moreove...