Sciweavers

39 search results - page 7 / 8
» A First Step Towards the Automatic Generation of Security Pr...
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 7 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
CSEE
2008
Springer
13 years 7 months ago
Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning
Students have to cope with new technologies, changing environments, and conflicting changes in capstone projects. They often lack practical experience, which might lead to failing...
Eric Ras, Jörg Rech
IUI
2005
ACM
13 years 11 months ago
Task aware information access for diagnosis of manufacturing problems
Pinpoint is a promising first step towards using a rich model of task context in proactive and dynamic IR systems. Pinpoint allows a user to navigate decision tree representations...
Larry Birnbaum, Wallace J. Hopp, Seyed M. R. Irava...
LREC
2010
224views Education» more  LREC 2010»
13 years 7 months ago
Construction of Chunk-Aligned Bilingual Lecture Corpus for Simultaneous Machine Translation
With the development of speech and language processing, speech translation systems have been developed. These studies target spoken dialogues, and employ consecutive interpretatio...
Masaki Murata, Tomohiro Ohno, Shigeki Matsubara, Y...
DASIP
2010
13 years 26 days ago
RVC: A multi-decoder CAL Composer tool
The Reconfigurable Video Coding (RVC) framework is a recent ISO standard aiming at providing a unified specification of MPEG video technology in the form of a library of component...
Francesca Palumbo, Danilo Pani, Emanuele Manca, Lu...