Sciweavers

3927 search results - page 674 / 786
» Emotional Concept Development
Sort
View
ESORICS
2010
Springer
13 years 7 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
GLOBECOM
2010
IEEE
13 years 7 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...
GLOBECOM
2010
IEEE
13 years 7 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
ICSOC
2010
Springer
13 years 7 months ago
BPMN Modelling of Services with Dynamically Reconfigurable Transactions
We promote the use of transactional attributes for modelling business processes in the service-oriented scenario. Transactional attributes have been introduced in Enterprise JavaBe...
Laura Bocchi, Roberto Guanciale, Daniele Strollo, ...
INFOCOM
2010
IEEE
13 years 7 months ago
On Computing Compression Trees for Data Collection in Wireless Sensor Networks
We address the problem of efficiently gathering correlated data from a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and unders...
Jian Li, Amol Deshpande, Samir Khuller