Sciweavers

1424 search results - page 145 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
IPPS
2009
IEEE
14 years 3 months ago
Using hardware transactional memory for data race detection
Abstract—Widespread emergence of multicore processors will spur development of parallel applications, exposing programmers to degrees of hardware concurrency hitherto unavailable...
Shantanu Gupta, Florin Sultan, Srihari Cadambi, Fr...
INFOCOM
2008
IEEE
14 years 2 months ago
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection
—It has been of significant importance to provision network-wide guaranteed QoS for a wide range of event detection applications in wireless sensor networks (WSNs). This paper in...
Yanmin Zhu, Lionel M. Ni
TASLP
2002
93views more  TASLP 2002»
13 years 8 months ago
Robust endpoint detection and energy normalization for real-time speech and speaker recognition
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to th...
Qi Li, Jinsong Zheng, A. Tsai, Qiru Zhou
JEI
2008
128views more  JEI 2008»
13 years 7 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
ICRA
2008
IEEE
108views Robotics» more  ICRA 2008»
14 years 2 months ago
Detecting structural ambiguities and transitions during a guided tour
— Service robots designed for domestic settings need to navigate in an environment that they have to share with their users. Thus, they have to be able to report their current st...
Elin Anna Topp, Henrik I. Christensen