Sciweavers

2465 search results - page 276 / 493
» Distributed knowledge
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Unsupervised determination of efficient Korean LVCSR units using a Bayesian Dirichlet process model
Korean is an agglutinative language that does not have explicit word boundaries. It is also a highly inflective language that exhibits severe coarticulation effects. These charac...
Sakriani Sakti, Andrew M. Finch, Ryosuke Isotani, ...
CIDR
2007
165views Algorithms» more  CIDR 2007»
13 years 11 months ago
A Black-Box Approach to Query Cardinality Estimation
We present a “black-box” approach to estimating query cardinality that has no knowledge of query execution plans and data distribution, yet provides accurate estimates. It doe...
Tanu Malik, Randal C. Burns, Nitesh V. Chawla
COMCOM
2010
276views more  COMCOM 2010»
13 years 9 months ago
Adjustable convergecast tree protocol for wireless sensor networks
For data-collection applications in sensor networks, it is important to ensure base station receives a complete picture about the monitored area. Convergecast is an important commu...
Tzung-Shi Chen, Hua-Wen Tsai, Chih-Ping Chu
COMCOM
2008
80views more  COMCOM 2008»
13 years 9 months ago
Transforming general networks into feed-forward by using turn-prohibition
The issue of breaking cycles in communication networks is an important topic for several reasons. For instance, it is required when transparent bridges are filling the forwarding ...
Juan Echagüe, Jesús E. Villadangos, Vi...
CNSM
2010
13 years 7 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba