The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this context, anomal
The Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG are finalising a new standard for the coding (compression) of natural video images. The new standard [1] will be known as H.264 and also MPEG-4 Part 10, “Advanced Video Coding”. The standard
Abstract— This paper investigates and proposes a framework for the efficient integration of functionalities for dynamic spectrum use (e.g., spectrum aggregation) and cooperative radio resource management (RRM) in the scope of IMT-Advanced (IMT-A) ca
Abstract—Pervasive learning is a branch of mobile learning with an emphasis on context-awareness. Pervasive learning spaces (PLSs) create bridges from the real world to the virtual world, allowing the context-sensitive utilization of real-world obje
A statistical parametric speech synthesis system based on hidden Markov models (HMMs) has grown in popularity over the last few years. This system simultaneously models spectrum, excitation, and duration of speech using context-dependent HMMs and ge
The pervasive computing area has recently gained major importance from both industry and academia and is changing the way we interact with our environment [1]. This computing domain emphasizes the use of small, intelligent and communicating daily li
n this paper, we propose a holistic lexicon-based approach to solving the problem by exploiting external evidences and linguistic conventions of natural language expressions. This approach allows the system to handle opinion words that are context d
This paper presents a new machine-learning Chinese word segmentation (CWS) approach, which defines CWS as a break-point classifi- cation problem; the break point is the bound- ary of two subsequent words. Further, this paper exploits a support vecto
Attacks in network have caused a variety of serious problems, but intrusion detection in network is still an immature technology. And it is very important for network security to timely detect anomalies and rapidly response. Many intrusion detection