Sciweavers

3480 search results - page 548 / 696
» A New Era of Performance Evaluation
Sort
View
JHSN
2006
95views more  JHSN 2006»
15 years 1 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
JMLR
2006
80views more  JMLR 2006»
15 years 1 months ago
Using Machine Learning to Guide Architecture Simulation
An essential step in designing a new computer architecture is the careful examination of different design options. It is critical that computer architects have efficient means by ...
Greg Hamerly, Erez Perelman, Jeremy Lau, Brad Cald...
94
Voted
JSAC
2006
127views more  JSAC 2006»
15 years 1 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
LRE
2006
173views more  LRE 2006»
15 years 1 months ago
Automatic induction of language model data for a spoken dialogue system
When building a new spoken dialogue application, large amounts of domain specific data are required. This paper addresses the issue of generating in-domain training data when litt...
Chao Wang, Grace Chung, Stephanie Seneff
ML
2006
ACM
113views Machine Learning» more  ML 2006»
15 years 1 months ago
Learning to bid in bridge
Bridge bidding is considered to be one of the most difficult problems for game-playing programs. It involves four agents rather than two, including a cooperative agent. In additio...
Asaf Amit, Shaul Markovitch