Sciweavers

5206 search results - page 946 / 1042
» The Architecture Of An Active Data Base Management System
Sort
View
CCS
2003
ACM
14 years 3 months ago
Origin authentication in interdomain routing
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
ISCAS
2008
IEEE
139views Hardware» more  ISCAS 2008»
14 years 5 months ago
Missing feature speech recognition in a meeting situation with maximum SNR beamforming
Abstract— Especially for tasks like automatic meeting transcription, it would be useful to automatically recognize speech also while multiple speakers are talking simultaneously....
Dorothea Kolossa, Shoko Araki, Marc Delcroix, Tomo...
SEMWEB
2007
Springer
14 years 4 months ago
Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service
Abstract. There is a growing discrepancy between the creation of digital content and its actual employment and usefulness in a learning society. Technologies for recording lectures...
Serge Linckels, Harald Sack, Christoph Meinel
GLOBECOM
2006
IEEE
14 years 4 months ago
Two Novel Iterative Joint Frequency-Offset and Channel Estimation Methods for OFDMA Uplink
—We address joint estimation of frequency offsets and channel responses in OFDMA uplink. A cyclically equal-spaced, equal-energy interleaved pilot preamble is proposed by which t...
Xiaoyu Fu, Hlaing Minn, Cyrus D. Cantrell
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
14 years 7 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan