Sciweavers

TFS
2010
117views Education» more  TFS 2010»
13 years 6 months ago
Variational Bayes for a Mixed Stochastic/Deterministic Fuzzy Filter
Abstract--This study, under the variational Bayes (VB) framework, infers the parameters of a Takagi
Mohit Kumar, Norbert Stoll, Regina Stoll
TFS
2010
116views Education» more  TFS 2010»
13 years 6 months ago
Fuzzy Filtering for Physiological Signal Analysis
This study suggests the use of fuzzy-filtering algorithms to deal with the uncertainties associated to the analysis of physiological signals. The signal characteristics, for a give...
Mohit Kumar, Matthias Weippert, Dagmar Arndt, Stef...
TELSYS
2010
154views more  TELSYS 2010»
13 years 6 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
TELSYS
2010
140views more  TELSYS 2010»
13 years 6 months ago
Information system security compliance to FISMA standard: a quantitative measure
To ensure that safeguards are implemented to protect against a majority of known threats, industry leaders are requiring information processing systems to comply with security stan...
Elaine Hulitt, Rayford B. Vaughn
TELSYS
2010
147views more  TELSYS 2010»
13 years 6 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
TELSYS
2010
104views more  TELSYS 2010»
13 years 6 months ago
The future of security in Wireless Multimedia Sensor Networks - A position paper
Manel Guerrero Zapata, Ruken Zilan, José M....
TELSYS
2010
76views more  TELSYS 2010»
13 years 6 months ago
Traitor tracing over YouTube video service - proof of concept
Joan Tomàs-Buliart, Marcel Fernandez, Migue...
TELSYS
2010
86views more  TELSYS 2010»
13 years 6 months ago
Cross-layer TCP with bitmap error recovery scheme in wireless ad hoc networks
Rung-Shiang Cheng, Der-Jiunn Deng, Yueh-Min Huang,...
TELSYS
2010
71views more  TELSYS 2010»
13 years 6 months ago
A novel user's authentication scheme for pervasive on-line media services
Neng-Wen Wang, Han-Chieh Chao, Ing-Yi Chen, Yueh-M...