Sciweavers

CIT
2006
Springer
14 years 3 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
CIT
2006
Springer
14 years 3 months ago
A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs
Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS s...
Mayank Mishra, Anirudha Sahoo
CIT
2006
Springer
14 years 3 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
CIT
2006
Springer
14 years 3 months ago
Fuzzy data mining for customer loyalty analysis
One of the major conceptual analyses in analytical CRM is customer loyalty. Current methods use user defined and statistical methods for loyalty analysis. One of the major limitat...
Jay B. Simha, S. S. Iyengar
CIT
2006
Springer
14 years 3 months ago
A High Performance ASIC for Cellular Automata (CA) Applications
CA are useful tools in modeling and simulation. However, the more complex a CA is, the longer it takes to run in typical environments. A dedicated CA machine solves this problem by...
Cheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mik...
CIT
2006
Springer
14 years 3 months ago
Voice Conversion by Prosody and Vocal Tract Modification
In this paper we proposed some flexible methods, which are useful in the process of voice conversion. The proposed methods modify the shape of the vocal tract system and the chara...
K. Sreenivasa Rao, B. Yegnanarayana
CIT
2006
Springer
14 years 3 months ago
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks
The ease of deployment and the infrastructure less nature of Mobile Ad hoc Networks (MANETs) make them highly desirable for the present day multi media communications. Traditional ...
Vinod Kone, Sukumar Nandi
CIT
2006
Springer
14 years 3 months ago
Performance of Sniff and Embark MAC Protocol for Real-Time Traffic in Wireless LANs
In this paper, we propose Sniff and Embark (SN E) protocol, a novel frame sniffing and token passing based approach to provide QoS in WLANs. Our simulations show that SN E perform...
Aditya Dhananjay, Debabrata Das
CIT
2006
Springer
14 years 3 months ago
Using AnsProlog with Link Grammar and WordNet for QA with deep reasoning
Early question and answering (QA) systems focused on keyword search among documents for answers. However, such systems can only answer fact-based questions. It becomes clear that ...
Chitta Baral, Luis Tari