Sciweavers

2957 search results - page 503 / 592
» Processing Self Corrections
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 5 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
TWC
2011
367views more  TWC 2011»
13 years 5 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien
EJASMP
2010
196views more  EJASMP 2010»
13 years 5 months ago
Optimizing Automatic Speech Recognition for Low-Proficient Non-Native Speakers
Computer Assisted Language Learning (CALL) applications for improving the oral skills of low-proficient learners have to cope with nonnative speech that is particularly challengin...
Joost van Doremalen, Catia Cucchiarini, Helmer Str...
INTERSPEECH
2010
13 years 5 months ago
Towards a robust face recognition system using compressive sensing
An application of compressive sensing (CS) theory in imagebased robust face recognition is considered. Most contemporary face recognition systems suffer from limited abilities to ...
Allen Y. Yang, Zihan Zhou, Yi Ma, Shankar Sastry
TALG
2010
93views more  TALG 2010»
13 years 4 months ago
Distributed error confinement
We initiate the study of error confinement in distributed applications, where the goal is that only nodes that were directly hit by a fault may deviate from their correct external...
Yossi Azar, Shay Kutten, Boaz Patt-Shamir