Sciweavers

474 search results - page 63 / 95
» Assurance Based Development of Critical Systems
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Effective background data selection in SVM speaker recognition for unseen test environment: More is not always better
This study focuses on determining a procedure to select effective negative examples for development of improved Support Vector Machine (SVM) based speaker recognition. Selection o...
Jun-Won Suh, Yun Lei, Wooil Kim, John H. L. Hansen
PPPJ
2006
ACM
15 years 10 months ago
Juxta-Cat: a JXTA-based platform for distributed computing
In this paper we present a JXTA-based platform, called Juxta-CAT, which is an effort to use the JXTA architecture to build a job execution-sharing distributed environment. The Ju...
Joan Esteve Riasol, Fatos Xhafa
SIGCOMM
2010
ACM
15 years 4 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
POPL
2005
ACM
15 years 10 months ago
Specifying Kerberos 5 cross-realm authentication
Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. We present a formalizat...
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
APSEC
2001
IEEE
15 years 8 months ago
Compilation of Specifications
Computer software now controls critical systems worldwide. International standards require such programs to be produced from mathematically-precise specifications, but the techniq...
Colin J. Fidge