Sciweavers

2801 search results - page 130 / 561
» On the Adequateness of the Connection Method
Sort
View
AWCC
2004
Springer
15 years 10 months ago
Real-Time Emulation of Intrusion Victim in HoneyFarm
Security becomes increasingly important. However, existing security tools, almost all defensive, have many vulnerabilities which are hard to overcome because of the lack of informa...
Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hu...
ACL
1998
15 years 6 months ago
Unlimited Vocabulary Grapheme to Phoneme Conversion for Korean TTS
This paper describes a grapheme-to-phoneme conversion method using phoneme connectivity and CCV conversion rules. The method consists of mainly four modules including morpheme nor...
Byeongchang Kim, Wonil Lee, Gary Geunbae Lee, Jong...
CGI
2004
IEEE
15 years 8 months ago
Computing Polygonal Surfaces from Unions of Balls
We present a new algorithm for computing a polygonal surface from a union of balls. The method computes and connects the singular points of a given union of balls in an efficient ...
Roger C. Tam, Wolfgang Heidrich
ALGOSENSORS
2004
Springer
15 years 10 months ago
On a Conjecture Related to Geometric Routing
We conjecture that any planar 3-connected graph can be embedded in the plane in such a way that for any nodes s and t, there is a path from s to t such that the Euclidean distance ...
Christos H. Papadimitriou, David Ratajczak
NOSSDAV
2001
Springer
15 years 9 months ago
Video over TCP with receiver-based delay control
Unicasting video streams over TCP connections is a challenging problem because video sources cannot normally adapt to delay and throughput variations of TCP connections. This pape...
Pai-Hsiang Hsiao, H. T. Kung, Koan-Sin Tan