Sciweavers

194 search results - page 28 / 39
» Bootstrapping in Peer-to-Peer Systems
Sort
View
IPPS
2006
IEEE
15 years 3 months ago
Web server protection by customized instruction set encoding
We present a novel technique to secure the execution of a processor against the execution of malicious code (trojans, viruses). The main idea is to permute parts of the opcode val...
Bernhard Fechner, Jörg Keller, Andreas Wohlfe...
WMASH
2003
ACM
15 years 3 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
15 years 1 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
EMNLP
2008
14 years 11 months ago
Mining and Modeling Relations between Formal and Informal Chinese Phrases from Web Corpora
We present a novel method for discovering and modeling the relationship between informal Chinese expressions (including colloquialisms and instant-messaging slang) and their forma...
Zhifei Li, David Yarowsky
ICASSP
2010
IEEE
14 years 10 months ago
Approaches to automatic lexicon learning with limited training examples
Preparation of a lexicon for speech recognition systems can be a significant effort in languages where the written form is not exactly phonetic. On the other hand, in languages w...
Nagendra Goel, Samuel Thomas, Mohit Agarwal, Pinar...