Sciweavers

1697 search results - page 298 / 340
» Social-Networks Connect Services
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
NAACL
1994
13 years 11 months ago
MACROPHONE: An American English Telephone Speech Corpus
Macrophone is a corpus of approximately 200,000 utterances, recorded over the telephone from a broad sample of about 5,000 American speakers. Sponsored by the Linguistic Data Cons...
Kelsey Taussig, Jared Bernstein
SWWS
2007
13 years 11 months ago
Modeling an Ontology for Managing Contexts in Smart Meeting Space
- In recent years, computing becomes more mobile and pervasive; these changes imply that applications and services must be aware of and adapt to their changing contexts in highly d...
Mohammad Rezwanul Huq, Nguyen Thi Thanh Tuyen, You...
HPCC
2010
Springer
13 years 11 months ago
Scheduling and Queue Management for Multi-class Traffic in Access Router of Mobility Protocol
The traffic characteristics in recent years have changed considerably having more video and audio traffic with critical real-time constraints. This situation is compounded by the i...
Md. Shohrab Hossain, Mohammed Atiquzzaman, William...
ICASSP
2010
IEEE
13 years 10 months ago
NC node selection game in collaborative streaming systems
Network coding has been recently proposed as an efficient method to improve throughput, minimize delays and remove the need for reconciliation between network nodes in distribute...
Nikolaos Thomos, Hyunggon Park, Eymen Kurdoglu, Pa...