Sciweavers

10809 search results - page 1993 / 2162
» Location Based Services
Sort
View
INTERSPEECH
2010
14 years 11 months ago
Expectations for discourse genre identification: a prosodic study
Speech can be divided into discourse genres based on the contextual environment it occurs in (e.g. political speech, sport commentary speech, etc.). The present study investigated...
Nicolas Obin, Volker Dellwo, Anne Lacheret, Xavier...
JCIT
2010
197views more  JCIT 2010»
14 years 11 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
JCIT
2010
162views more  JCIT 2010»
14 years 11 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
130
Voted
JDCTA
2010
190views more  JDCTA 2010»
14 years 11 months ago
Advanced Interactive T-Learning System with Variable Remote Control
T-Learning was passive, for a long time, because of the restrictions imposed on TVs. The relevant restrictions are a result of the input function, i.e. the normal TV remote contro...
Tzu-Chih Chung, Li-Ya Tseng
JOC
2010
92views more  JOC 2010»
14 years 11 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
« Prev « First page 1993 / 2162 Last » Next »