Sciweavers

8655 search results - page 1422 / 1731
» Challenges for Trusted Computing
Sort
View
ECEASST
2010
14 years 10 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
125
Voted
EJASMP
2010
196views more  EJASMP 2010»
14 years 10 months ago
Optimizing Automatic Speech Recognition for Low-Proficient Non-Native Speakers
Computer Assisted Language Learning (CALL) applications for improving the oral skills of low-proficient learners have to cope with nonnative speech that is particularly challengin...
Joost van Doremalen, Catia Cucchiarini, Helmer Str...
105
Voted
HOTNETS
2010
14 years 10 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...
138
Voted
HOTNETS
2010
14 years 10 months ago
Data center networking with multipath TCP
Recently new data center topologies have been proposed that offer higher aggregate bandwidth and location independence by creating multiple paths in the core of the network. To ef...
Costin Raiciu, Christopher Pluntke, Sébasti...
JAISE
2010
169views Algorithms» more  JAISE 2010»
14 years 10 months ago
Responsive environments: User experiences for ambient intelligence
In this paper we review the emerging field of responsive environments as an ambient intelligence system with a focus on user experience. We see responsive environments as a combina...
Jorge Alves Lino, Benjamin Salem, Matthias Rauterb...
« Prev « First page 1422 / 1731 Last » Next »