Sciweavers

427 search results - page 54 / 86
» Hybrid Soft Computing: Where are we Going
Sort
View
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 7 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
VTC
2008
IEEE
150views Communications» more  VTC 2008»
14 years 1 months ago
Impact of Signaling Load on the UMTS Call Blocking/Dropping
— Radio resources in the third generation (3G) wireless cellular networks (WCNs) such as the universal mobile telecommunications system (UMTS) network is limited in term of soft ...
Saowaphak Sasanus, David Tipper, Yi Qian
INFFUS
2006
103views more  INFFUS 2006»
13 years 7 months ago
Information fusion approaches to the automatic pronunciation of print by analogy
Automatic pronunciation of words from their spelling alone is a hard computational problem, especially for languages like English and French where there is only a partially consis...
Robert I. Damper, Yannick Marchand
CVPR
2010
IEEE
14 years 27 days ago
Dense Interest Points
Local features or image patches have become a standard tool in computer vision, with numerous application domains. Roughly speaking, two different types of patchbased image repres...
Tinne Tuytelaars
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham