Sciweavers

16 search results - page 3 / 4
» Voting Paths
Sort
View
DSN
2009
IEEE
14 years 2 days ago
Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems
The threat of soft error induced system failure in high performance computing systems has become more prominent, as we adopt ultra-deep submicron process technologies. In this pap...
Naga Durga Prasad Avirneni, Viswanathan Subramania...
SECPERU
2006
IEEE
13 years 11 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
SPAA
2010
ACM
13 years 10 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
TASLP
2008
229views more  TASLP 2008»
13 years 5 months ago
System Combination for Machine Translation of Spoken and Written Language
This paper describes an approach for computing a consensus translation from the outputs of multiple machine translation (MT) systems. The consensus translation is computed by weigh...
Evgeny Matusov, Gregor Leusch, Rafael E. Banchs, N...
CE
2005
60views more  CE 2005»
13 years 5 months ago
Personalized e-learning system using Item Response Theory
Personalized service is important on the Internet, especially in Web-based learning. Generally, most personalized systems consider learner preferences, interests, and browsing beh...
Chih-Ming Chen, Hahn-Ming Lee, Ya-Hui Chen