Sciweavers

24529 search results - page 256 / 4906
» Computing on Authenticated Data
Sort
View
145
Voted
COLING
1990
15 years 4 months ago
Syntactic Normalization Of Spontaneous Speech
This paper presents some techniques that provide a standard parsing system for the analysis of ill-formed utterances. These techniques are feature generalization and heuristically...
Hagen Langer
170
Voted
ALIFE
1999
15 years 3 months ago
An Approach to Biological Computation: Unicellular Core-Memory Creatures Evolved Using Genetic Algorithms
A novel machine language genetic programming system that uses one-dimensional core memories is proposed and simulated. The core is compared to a biochemical reaction space, and in ...
Hikeaki Suzuki
111
Voted
PERCOM
2009
ACM
15 years 10 months ago
Quality- and Energy-Aware Data Compression by Aggregation in WSN Data Streams
Cinzia Cappiello, Fabio A. Schreiber
131
Voted
SOUPS
2006
ACM
15 years 9 months ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
150
Voted
CN
2007
137views more  CN 2007»
15 years 3 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia