Sciweavers

53327 search results - page 10594 / 10666
» or 2007
Sort
View
TASLP
2008
124views more  TASLP 2008»
13 years 8 months ago
Joint Dereverberation and Residual Echo Suppression of Speech Signals in Noisy Environments
Hands-free devices are often used in a noisy and reverberant environment. Therefore, the received microphone signal does not only contain the desired near-end speech signal but als...
Emanuel A. P. Habets, Sharon Gannot, Israel Cohen,...
IJWIS
2007
111views more  IJWIS 2007»
13 years 8 months ago
Monitoring the "health" status of open source web-engineering projects
—In response to the increasing number of open source software (OSS) project initiatives and the increasing demand of OSS products as alternative solutions by industries, it is im...
Dindin Wahyudin, Khabib Mustofa, Alexander Schatte...
IJWIS
2007
153views more  IJWIS 2007»
13 years 8 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
IJWIS
2007
181views more  IJWIS 2007»
13 years 8 months ago
Answering queries over incomplete data stream histories
Streams of data often originate from many distributed sources. A distributed stream processing system publishes such streams of data and enables queries over the streams. This allo...
Alasdair J. G. Gray, Werner Nutt, M. Howard Willia...
IMCS
2007
144views more  IMCS 2007»
13 years 8 months ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova
« Prev « First page 10594 / 10666 Last » Next »