Sciweavers

648 search results - page 121 / 130
» The GCHQ Protocol and Its Problems
Sort
View
IAJIT
2007
128views more  IAJIT 2007»
13 years 8 months ago
A Multi-Agent System for POS-Tagging Vocalized Arabic Texts
: In this paper, we address the problem of Part-Of-Speech(POS) tagging of Arabic texts with vowel marks. After the description of the specificities of Arabic language and the induc...
Chiraz Ben Othmane Zribi, Aroua Torjmen, Mohamed B...
NETWORK
2006
290views more  NETWORK 2006»
13 years 8 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
TCAD
2008
103views more  TCAD 2008»
13 years 8 months ago
Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems
Latency-insensitive protocols allow system-on-chip (SoC) engineers to decouple the design of the computing cores from the design of the intercore communication channels while follo...
Rebecca L. Collins, Luca P. Carloni
BMCBI
2005
94views more  BMCBI 2005»
13 years 8 months ago
Workflows in bioinformatics: meta-analysis and prototype implementation of a workflow generator
Background: Computational methods for problem solving need to interleave information access and algorithm execution in a problem-specific workflow. The structures of these workflo...
Alexander García Castro, Samuel Thoraval, L...
TROB
2008
159views more  TROB 2008»
13 years 8 months ago
Distributed Connectivity Control of Mobile Networks
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
Michael M. Zavlanos, George J. Pappas