Sciweavers

5465 search results - page 958 / 1093
» Assigning Types to Processes
Sort
View
121
Voted
ASSETS
2009
ACM
15 years 9 months ago
Comparing evaluation techniques for text readability software for adults with intellectual disabilities
In this paper, we compare alternative techniques for evaluating a software system for simplifying the readability of texts for adults with mild intellectual disabilities (ID). We ...
Matt Huenerfauth, Lijun Feng, Noemie Elhadad
MOBICOM
2009
ACM
15 years 9 months ago
Interference management via rate splitting and HARQ over time-varying fading channels
The coexistence of two unlicensed links is considered, where one link interferes with the transmission of the other, over a timevarying, block-fading channel. In the absence of fa...
Marco Levorato, Osvaldo Simeone, Urbashi Mitra
ICASSP
2008
IEEE
15 years 9 months ago
Sparse reconstruction by separable approximation
Finding sparse approximate solutions to large underdetermined linear systems of equations is a common problem in signal/image processing and statistics. Basis pursuit, the least a...
Stephen J. Wright, Robert D. Nowak, Mário A...
NCA
2008
IEEE
15 years 9 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
145
Voted
NDSS
2008
IEEE
15 years 9 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...