Sciweavers

871 search results - page 79 / 175
» A Decentralized Authorization Architecture
Sort
View
AGI
2008
14 years 11 months ago
Seven Principles of Synthetic Intelligence
Understanding why the original project of Artificial Intelligence is widely regarded as a failure and has been abandoned even by most of contemporary AI research itself may prove c...
Joscha Bach
MT
2000
124views more  MT 2000»
14 years 9 months ago
Nine Issues in Speech Translation
This paper sketches the author's research in nine areas related to speech translation: interactive disambiguation (two demonstrations of highly-interactive, broad-coverage sp...
Mark Seligman
ERSA
2003
137views Hardware» more  ERSA 2003»
14 years 11 months ago
Next Generation Architecture for Heterogeneous Embedded Systems
The Software Communications Architecture (SCA), a mandatory specification for Software Radio implementations by the Joint Tactical Radio System (JTRS), defines a Common Object R...
S. Murat Bicer, Frank Pilhofer, Graham Bardouleau,...
EUROSYS
2009
ACM
15 years 7 months ago
Isolating web programs in modern browser architectures
Many of today’s web sites contain substantial amounts of client-side code, and consequently, they act more like programs than simple documents. This creates robustness and perfo...
Charles Reis, Steven D. Gribble
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 4 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee