Spoofing Herzog and Herzog Spoofing
نویسندگان
چکیده
منابع مشابه
Draft Shai Herzog
This memo presents a set of extensions for supporting generic policy based admission control in RSVP. It should be perceived as an extension to the RSVP functional specifications [RSVP] These extensions include the standard format of POLICY_DATA objects, and a description of RSVP’s handling of policy events. This document does not advocate particular policy control mechanisms; however, a Router...
متن کاملDagmar Herzog : Sex after Fascism
University Press. All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher, except for reading and browsing via the World Wide Web. Users are not permitted to mount this file on any network servers. Introduction WHAT IS T...
متن کاملSpeaker Recognition Anti-spoofing
Progress in the development of spoofing countermeasures for automatic speaker recognition is less advanced than equivalent work related to other biometric modalities. This chapter outlines the potential for even state-of-the-art automatic speaker recognition systems to be spoofed. While the use of a multitude of different datasets, protocols and metrics complicates the meaningful comparison of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transit
سال: 2010
ISSN: 1551-9627
DOI: 10.5070/t761009750