-
1
-
-
18844382528
-
Integrated pervasive computing environments
-
M. Satyanarayanan, "Integrated Pervasive Computing Environments," IEEE Pervasive Computing, 1(2), 2002, pp. 2-3.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 2-3
-
-
Satyanarayanan, M.1
-
2
-
-
0002058575
-
Connecting the physical world with pervasive networks
-
D. Estrin, D. Culler, K. Pister, and G. Sukhatme, "Connecting the Physical World with Pervasive Networks," IEEE Pervasive Computing, 1(1), 2002, pp. 59-69
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.1
, pp. 59-69
-
-
Estrin, D.1
Culler, D.2
Pister, K.3
Sukhatme, G.4
-
3
-
-
33744491177
-
Making voice knowledge pervasive
-
N. Anerousis and E. Panagos, "Making Voice Knowledge Pervasive," IEEE Pervasive Computing, 1(2), 2002, pp. 42-48.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 42-48
-
-
Anerousis, N.1
Panagos, E.2
-
4
-
-
0029410152
-
Operational and experimental French telecommunication services using CNET speech recognition and text-to-speech synthesis
-
C. Sorin, D. Jouvet, C. Gagnoulet, D. Dubois, D. Sadek, and M. Toularhoat, "Operational and experimental French telecommunication services using CNET speech recognition and text-to-speech synthesis," Speech communication, 17, 1995, pp. 273-286.
-
(1995)
Speech Communication
, vol.17
, pp. 273-286
-
-
Sorin, C.1
Jouvet, D.2
Gagnoulet, C.3
Dubois, D.4
Sadek, D.5
Toularhoat, M.6
-
5
-
-
2942753915
-
Analysing interactive voice services
-
K. Turner, K. J., "Analysing interactive voice services," Computer Networks, 45(5), 2004, pp. 665-685.
-
(2004)
Computer Networks
, vol.45
, Issue.5
, pp. 665-685
-
-
Turner, K.1
J., K.2
-
6
-
-
0043092649
-
It's good to talk [speech technology for on-line services access]
-
R. Dettmer, "It's good to talk [speech technology for on-line services access]," IEE Review, vol. 49, 2003, pp. 30-33.
-
(2003)
IEE Review
, vol.49
, pp. 30-33
-
-
Dettmer, R.1
-
7
-
-
0242577989
-
VoiceXML and the W3C speech interface framework
-
J. A. Larson, "VoiceXML and the W3C speech interface framework," IEEE Multimedia, vol. 10, 2003, pp. 91-93.
-
(2003)
IEEE Multimedia
, vol.10
, pp. 91-93
-
-
Larson, J.A.1
-
9
-
-
33744496948
-
Current threats to and technical solutions for voice security
-
IEEE
-
M. D. Collier, "Current threats to and technical solutions for voice security," Aerospace Conference Proceedings, IEEE, 2002, pp.2685-2695.
-
(2002)
Aerospace Conference Proceedings
, pp. 2685-2695
-
-
Collier, M.D.1
-
10
-
-
33744492241
-
-
IBM Redbooks
-
A. Rodriguez, W.-K. Ho, G. Kempny, M. Pedreschi, and N. Richards, IBM WebSphere Voice Server 2.0 Implementation Guide, IBM Redbooks, 2002.
-
(2002)
IBM WebSphere Voice Server 2.0 Implementation Guide
-
-
Rodriguez, A.1
Ho, W.-K.2
Kempny, G.3
Pedreschi, M.4
Richards, N.5
-
11
-
-
0038589200
-
-
W3C Recommendation
-
S. Adler, A. Berglund, and J. Caruso, Extensible Stylesheet Language (XSL), Version 1.0, W3C Recommendation, 2001.
-
(2001)
Extensible Stylesheet Language (XSL), Version 1.0
-
-
Adler, S.1
Berglund, A.2
Caruso, J.3
-
13
-
-
0030358528
-
A software based approach to secure voice applications
-
G. Troullinos, "A software based approach to secure voice applications," Proceedings of the Third IEEE International Conference on Electronics, Circuits, and System, vol. 1, 1996, pp. 176-182.
-
(1996)
Proceedings of the Third IEEE International Conference on Electronics, Circuits, and System
, vol.1
, pp. 176-182
-
-
Troullinos, G.1
-
14
-
-
0021501413
-
Speech-quality assessment methods for speech-coding systems
-
N. Kitawaki, M. Honda, and K. Itoh, "Speech-quality assessment methods for speech-coding systems," IEEE Communications, vol. 22, 1984, pp. 26-33.
-
(1984)
IEEE Communications
, vol.22
, pp. 26-33
-
-
Kitawaki, N.1
Honda, M.2
Itoh, K.3
-
15
-
-
0036697706
-
New voice over Internet protocol technique with hierarchical data security protection
-
J.-I. Guo, J.-C. Yen, and H.-F. Pai, "New voice over Internet protocol technique with hierarchical data security protection," IEE Proceedings Vision, Image and Signal Processing, vol. 149, 2002, pp. 237-243
-
(2002)
IEE Proceedings Vision, Image and Signal Processing
, vol.149
, pp. 237-243
-
-
Guo, J.-I.1
Yen, J.-C.2
Pai, H.-F.3
-
16
-
-
84962676042
-
Performance study of software-based iSCSI security
-
IEEE
-
S.-Y. Tang, Y.-P. Lu, and D. H. C. Du, "Performance study of software-based iSCSI security," First IEEE International Security in Storage Workshop, IEEE, 2002, pp. 70-79.
-
(2002)
First IEEE International Security in Storage Workshop
, pp. 70-79
-
-
Tang, S.-Y.1
Lu, Y.-P.2
Du, D.H.C.3
-
17
-
-
0018040291
-
An approach to secure voice communication based on the data encryption standard
-
M. Orceyre and R. Heller, "An approach to secure voice communication based on the data encryption standard," IEEE Communications Magazine, vol. 16, 1978, pp. 41-50.
-
(1978)
IEEE Communications Magazine
, vol.16
, pp. 41-50
-
-
Orceyre, M.1
Heller, R.2
-
18
-
-
84948961076
-
Voice over IPsec: Analysis and solutions
-
R. Barbieri, D. Bruschi, and E. Rosti, "Voice over IPsec: analysis and solutions," 18th Annual Computer Security Applications Conference, 2002, pp.261-270.
-
(2002)
18th Annual Computer Security Applications Conference
, pp. 261-270
-
-
Barbieri, R.1
Bruschi, D.2
Rosti, E.3
-
19
-
-
0033282828
-
Architecture for secure network voice
-
M. S. McBeth, R. Cole, Jr., and R. B. Adamson, "Architecture for secure network voice," IEEE Military Communications Conference Proceedings, vol. 2, 1999, pp. 1454-1457.
-
(1999)
IEEE Military Communications Conference Proceedings
, vol.2
, pp. 1454-1457
-
-
McBeth, M.S.1
Cole Jr., R.2
Adamson, R.B.3
-
20
-
-
33646500392
-
The Rijndael algorithm
-
T. Jamil, "The Rijndael algorithm," IEEE Potentials, vol. 23, 2004, pp. 36-38.
-
(2004)
IEEE Potentials
, vol.23
, pp. 36-38
-
-
Jamil, T.1
-
23
-
-
0021373630
-
An improved LPC algorithm for voiced-speech synthesis
-
E. Shichor and H. Silverman, "An improved LPC algorithm for voiced-speech synthesis," IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 32, 1984, pp. 180-183.
-
(1984)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.32
, pp. 180-183
-
-
Shichor, E.1
Silverman, H.2
-
24
-
-
33744470768
-
Speech coding based on adaptive mel-cepstral analysis
-
K. Tokuda, H. Matsumura, T. Kobayashi, and S. Imai, "Speech coding based on adaptive mel-cepstral analysis," ICASSP-94, 1994 IEEE International Conference on Acoustics, Speech, and Signal Processing, 1994, pp. 197-200.
-
(1994)
ICASSP-94, 1994 IEEE International Conference on Acoustics, Speech, and Signal Processing
, pp. 197-200
-
-
Tokuda, K.1
Matsumura, H.2
Kobayashi, T.3
Imai, S.4
-
25
-
-
4243507072
-
Secure speech and data communication over the public switching telephone network
-
L. Diez-Del-Rio, S. Moreno-Perez, R. Sarmiento, J. Parera, M. Veiga-Perez, and R. Garcia-Gomez, "Secure speech and data communication over the public switching telephone network," ICASSP-94, 1994 IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, 1994, pp. 425-428.
-
(1994)
ICASSP-94, 1994 IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.2
, pp. 425-428
-
-
Diez-Del-Rio, L.1
Moreno-Perez, S.2
Sarmiento, R.3
Parera, J.4
Veiga-Perez, M.5
Garcia-Gomez, R.6
-
26
-
-
0020599970
-
Implementation of various LPC algorithms using commercial digital signal processors
-
A. Kaltenmeier, "Implementation of various LPC algorithms using commercial digital signal processors," ICASSP-83, 1983 IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 8, 1983, pp. 487-490.
-
(1983)
ICASSP-83, 1983 IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.8
, pp. 487-490
-
-
Kaltenmeier, A.1
-
27
-
-
33744491443
-
Improved IDEA
-
S. L. C. Salomao, J. M. S. de Alcantara, V. C. Alves, and F. M. G. Franca, "Improved IDEA," Proceedings, 13th Symposium on Integrated Circuits and Systems Design, 2000, pp. 47-52.
-
(2000)
Proceedings, 13th Symposium on Integrated Circuits and Systems Design
, pp. 47-52
-
-
Salomao, S.L.C.1
De Alcantara, J.M.S.2
Alves, V.C.3
Franca, F.M.G.4
-
28
-
-
84953635000
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
R. Anderson, ed., Springer-Verlag
-
B. Schneier, "Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)," in R. Anderson, ed., Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191-204.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop Proceedings
, pp. 191-204
-
-
Schneier, B.1
-
29
-
-
0029223392
-
The effect of clustering on the performance of hashing algorithms
-
E. Macii, "The effect of clustering on the performance of hashing algorithms," Proceedings, IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, 1995, pp. 149-152.
-
(1995)
Proceedings, IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing
, pp. 149-152
-
-
Macii, E.1
|