Sciweavers

1411 search results - page 146 / 283
» On the modelling and performance evaluation of optical burst...
Sort
View
HICSS
2000
IEEE
146views Biometrics» more  HICSS 2000»
14 years 1 months ago
Transmission of MPEG-2 Encoded VoD Services over Wireless Access Networks Using Type-II Hybrid ARQ Schemes with RCPC Codes
In this paper, we investigate the e ectiveness of applying type-II hybrid ARQ schemes to the transmission of MPEG-2 encoded video streams over xed wireless links in broadband xed ...
Hairuo Ma, Magda El Zarki
CAMAD
2006
IEEE
14 years 24 days ago
Ensuring IP services consistency through lightweight monitoring-based admission control
Abstract-- This paper evaluates the performance of a distributed and lightweight AC model based on per-class edge-toedge monitoring feedback for ensuring the quality of multiple se...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas
KES
2000
Springer
14 years 21 days ago
Genetically optimised feedforward neural networks for speaker identification
The problem of establishing the identity of a speaker from a given utterance has been conventionally addressed using techniques such as Gaussian Mixture Models (GMM's) that m...
Richard C. Price, Jonathan P. Willmore, William J....
LCN
2005
IEEE
14 years 2 months ago
On Reorder Density and its Application to Characterization of Packet Reordering
A formal approach for characterizing, evaluating and modeling packet reordering is presented. Reordering is, a phenomenon that is likely to become increasingly common on Internet,...
Nischal M. Piratla, Anura P. Jayasumana, Tarun Ban...
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
14 years 9 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...