Sciweavers

65 search results - page 12 / 13
» Answer Translation: An Alternative Approach to Cross-Lingual...
Sort
View
JHSN
2002
119views more  JHSN 2002»
13 years 6 months ago
On the efficacy of quality, frame rate, and buffer management for video streaming across best-effort networks
In this paper, we propose a mechanism that supports the high quality streaming and adaptation of stored, constant-quality video across best-effort networks. The difficulty in the d...
Wu-chi Feng
ACSAC
2005
IEEE
14 years 2 days ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
DSN
2003
IEEE
13 years 11 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
SIGCOMM
2010
ACM
13 years 6 months ago
California fault lines: understanding the causes and impact of network failures
Of the major factors affecting end-to-end service availability, network component failure is perhaps the least well understood. How often do failures occur, how long do they last,...
Daniel Turner, Kirill Levchenko, Alex C. Snoeren, ...
PODS
2008
ACM
165views Database» more  PODS 2008»
14 years 6 months ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo