Sciweavers

68 search results - page 13 / 14
» Regular Transformations of Data Words Through Origin Informa...
Sort
View
IEEECIT
2010
IEEE
13 years 4 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
SCP
1998
112views more  SCP 1998»
13 years 5 months ago
Structured Gamma
The Gamma language is based on the chemical reaction metaphor which has a number of benefits with respect to parallelism and program derivation. But the original definition of G...
Pascal Fradet, Daniel Le Métayer
ASPLOS
1996
ACM
13 years 9 months ago
An Integrated Compile-Time/Run-Time Software Distributed Shared Memory System
On a distributed memory machine, hand-coded message passing leads to the most efficient execution, but it is difficult to use. Parallelizing compilers can approach the performance...
Sandhya Dwarkadas, Alan L. Cox, Willy Zwaenepoel
JCST
2006
99views more  JCST 2006»
13 years 5 months ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...
ECCE
2011
12 years 5 months ago
Design of a safe computer-supported cooperative environment in radiotherapy: exploratory identification of cooperation strategie
Motivation – This research deals with the identification of collective production of a safe radiotherapy treatment and its potential assistance through computer-supported enviro...
Maria Isabel Munoz, Vanina Mollo, Flore Barcellini...