Sciweavers

2236 search results - page 343 / 448
» Intrusion detection techniques and approaches
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Collaborative Opportunistic Spectrum Access in the Presence of Multiple Transmitters
Abstract— We present a collaborative algorithm to enable opportunistic spectrum access for cognitive radios in the presence of multiple co-channel transmitters. A spectrum hole d...
Ahmed O. Nasif, Brian L. Mark
ICASSP
2008
IEEE
14 years 3 months ago
An empirical study of automatic accent classification
This paper extends language identification (LID) techniques to a large scale accent classification task: 23-way classification of foreign-accented English. We find that a pure...
Ghinwa F. Choueiter, Geoffrey Zweig, Patrick Nguye...
ICASSP
2007
IEEE
14 years 3 months ago
A New Robust Frequency Domain Echo Canceller with Closed-Loop Learning Rate Adaptation
One of the main dif culties in echo cancellation is the fact that the learning rate needs to vary according to conditions such as double-talk and echo path change. Several methods...
Jean-Marc Valin, Iain B. Collings
ICC
2007
IEEE
14 years 3 months ago
Locating Congested Segments on the Internet by Clustering the Delay Performance of Multiple Paths
— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
AI
2007
Springer
14 years 3 months ago
Learning Network Topology from Simple Sensor Data
In this paper, we present an approach for recovering a topological map of the environment using only detection events from a deployed sensor network. Unlike other solutions to this...
Dimitri Marinakis, Philippe Giguère, Gregor...