Sciweavers

1494 search results - page 269 / 299
» Polynomial time algorithms for network information flow
Sort
View
ISNN
2009
Springer
14 years 3 months ago
Research on Segment Acoustic Model Based Mandarin LVCSR
SM has shown a better performance than HMM in connected word recognition system; however, no reports we have read show that SM has been applied in LVCSR as decoding acoustic model ...
Wenju Liu, Yun Tang, Shouye Peng
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 3 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ICDCSW
2007
IEEE
14 years 3 months ago
Using a Context Quality Measure for Improving Smart Appliances
Many Ubicomp appliances require the recognition of context. Existing context systems do not provide information about the quality of the context recognizied to the appliance at ru...
Martin Berchtold, Christian Decker, Till Riedel, T...
ICASSP
2011
IEEE
13 years 12 days ago
Non-centralized target tracking with mobile agents
In this paper we consider the problem of target tracking in a network of mobile agents. We propose a scheme with agents that are endowed with processing and decision-making capabi...
Petar M. Djuric, Jonathan Beaudeau, Mónica ...
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi