Sciweavers

20673 search results - page 4032 / 4135
» Improving Performance on the Internet
Sort
View
RIVF
2007
15 years 5 months ago
Thai Speech Keyword Spotting using Heterogeneous Acoustic Modeling
This paper illustrates the use of acoustic modeling of spoken dialog systems. One major problem with using speech three different structures, including syllables, fillers and recog...
S. Tangruamsub, Proadpran Punyabukkana, Atiwong Su...
ACSW
2006
15 years 5 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
DELOS
2004
15 years 5 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann
CSREAESA
2006
15 years 5 months ago
Design and Implementation of SoPC with Multi-Bus on a Chip
SoPC (System on a Programmable Chip) is one important kind of SoC solution based on PLD (Programmable Logic Device). At the same time, PBD (Platform-based Design) has become popul...
Fangjun Jian, Jizhong Han, Chengde Han, Qin Zhang,...
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 5 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
« Prev « First page 4032 / 4135 Last » Next »