Sciweavers

2997 search results - page 482 / 600
» Fuzzy robustness analysis
Sort
View
TSD
2007
Springer
14 years 3 months ago
Automatic Evaluation of Pathologic Speech - from Research to Routine Clinical Use
Previously we have shown that ASR technology can be used to objectively evaluate pathologic speech. Here we report on progress for routine clinical use: 1) We introduce an easy-to-...
Elmar Nöth, Andreas Maier, Tino Haderlein, Ko...
UCS
2007
Springer
14 years 3 months ago
Using Auction Based Group Formation for Collaborative Networking in Ubicomp
In many Ubicomp scenarios tiny wireless embedded sensor devices are used, and devices often collaborate to accomplish a common goal. This paper presents a group formation method de...
Christian Decker, Emilian Peev, Till Riedel, Marti...
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 3 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
AHS
2006
IEEE
164views Hardware» more  AHS 2006»
14 years 2 months ago
Automatic Hybrid Genetic Algorithm Based Printed Circuit Board Inspection
The paper presents a novel integrated system in which a number of image processing algorithm are embedded within a Genetic Algorithm (GA) based framework in order to provide an ad...
Syamsiah Mashohor, Jonathan R. Evans, Ahmet T. Erd...
ASWEC
2006
IEEE
14 years 2 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...