Sciweavers

1270 search results - page 118 / 254
» IF Validation Environment Tutorial
Sort
View
ICASSP
2008
IEEE
14 years 5 months ago
Robust speaker identification using combined feature selection and missing data recognition
Missing data techniques have been recently applied to speaker recognition to increase performance in noisy environments. The drawback of these techniques is the vulnerability of t...
Daniel Pullella, Marco Kühne, Roberto Togneri
ICDCS
2008
IEEE
14 years 5 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
14 years 5 months ago
Target assignment for integrated search and tracking by active robot networks
Abstract—This paper presents a new task assignment algorithm that integrates area search and target tracking. A new tracking metric is derived that encodes the ability of each ro...
Eric W. Frew, Jack Elston
INFOCOM
2008
IEEE
14 years 5 months ago
An Empirical Activity Model for WLAN Users
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
Caleb T. Phillips, Suresh Singh
ISCAS
2008
IEEE
102views Hardware» more  ISCAS 2008»
14 years 5 months ago
A multiplexed biosensor based on biomolecular nanowires
—In this paper we describe the fabrication and characterization of a multiplexed biosensor based on molecular bio-wires that can be used for detecting multiple pathogens in a bio...
Yang Liu, Shantanu Chakrabartty, Evangelyn C. Aloc...