Sciweavers

14824 search results - page 2937 / 2965
» Is This a Pattern
Sort
View
153
Voted
JSAC
2011
219views more  JSAC 2011»
14 years 9 months ago
Detection of Small-Scale Primary Users in Cognitive Radio Networks
Abstract—In cognitive radio networks (CRNs), detecting smallscale primary devices, such as wireless microphones, is a challenging, but very important, problem that has not yet be...
Alexander W. Min, Xinyu Zhang, Kang G. Shin
162
Voted
NECO
2011
14 years 9 months ago
Collective Stability of Networks of Winner-Take-All Circuits
The neocortex has a remarkably uniform neuronal organization, suggesting that common principles of processing are employed throughout its extent. In particular, the patterns of co...
Ueli Rutishauser, Rodney J. Douglas, Jean-Jacques ...
131
Voted
EJASMP
2010
136views more  EJASMP 2010»
14 years 9 months ago
Ageing Voices: The Effect of Changes in Voice Parameters on ASR Performance
With ageing, human voices undergo several changes which are typically characterized by increased hoarseness and changes in articulation patterns. In this study, we have examined t...
Ravichander Vipperla, Steve Renals, Joe Frankel
193
Voted
WWW
2011
ACM
14 years 9 months ago
Second international workshop on RESTful design (WS-REST 2011)
Over the past few years, the discussion between the two major architectural styles for designing and implementing Web services, the RPC-oriented approach and the resourceoriented ...
Cesare Pautasso, Erik Wilde, Rosa Alarcón
166
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 9 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
« Prev « First page 2937 / 2965 Last » Next »