Sciweavers

3095 search results - page 557 / 619
» Ubiquitous presence systems
Sort
View
HT
2009
ACM
13 years 12 months ago
Four measures for the dynamics of coalitions in social networks
We introduce four measures for the change of coalitions in social networks. The first one measures the change of the agents in the network over time, The second one measures the ...
Guido Boella, Leendert van der Torre, Serena Villa...
RIVF
2007
13 years 10 months ago
Thai Speech Keyword Spotting using Heterogeneous Acoustic Modeling
This paper illustrates the use of acoustic modeling of spoken dialog systems. One major problem with using speech three different structures, including syllables, fillers and recog...
S. Tangruamsub, Proadpran Punyabukkana, Atiwong Su...
FLAIRS
2004
13 years 10 months ago
Satisfying Varying Retrieval Requirements in Case Based Intelligent Directory Assistance
Intelligent directory assistance is the ability to retrieve relevant subscriber records in the presence of mismatches between the query and the subscriber record. The challenges a...
Vivek Balaraman, Sutanu Chakraborti
CN
2008
84views more  CN 2008»
13 years 8 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
COMCOM
2008
84views more  COMCOM 2008»
13 years 8 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse