Sciweavers

8177 search results - page 1484 / 1636
» Detecting System Emulators
Sort
View
134
Voted
WORM
2004
15 years 5 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
108
Voted
ACL
1998
15 years 5 months ago
Towards a Single Proposal in Spelling Correction
The study presented here relies on the integrated use of different kinds of knowledge in order to improve first-guess accuracy in non-word context-sensitive correction for general...
Eneko Agirre, Koldo Gojenola Galletebeitia, Kepa S...
90
Voted
ACL
1998
15 years 5 months ago
Unlimited Vocabulary Grapheme to Phoneme Conversion for Korean TTS
This paper describes a grapheme-to-phoneme conversion method using phoneme connectivity and CCV conversion rules. The method consists of mainly four modules including morpheme nor...
Byeongchang Kim, Wonil Lee, Gary Geunbae Lee, Jong...
125
Voted
AIPS
1998
15 years 5 months ago
Rationale-Based Monitoring for Planning in Dynamic Environments
We describe a framework for planning in dynamic environments. A central question is how to focus the sensing performed by such a system, so that it responds appropriately to relev...
Manuela M. Veloso, Martha E. Pollack, Michael T. C...
102
Voted
FTCS
1998
83views more  FTCS 1998»
15 years 5 months ago
The SunSCALR Framework for Internet Servers
Internet servers need to be highly-available, inexpensive, and scalable. These goals are often con icting and most designs meet, with limited success, only few of them. In this pa...
Ashish Singhai, Swee Boon Lim, Sanjay R. Radia
« Prev « First page 1484 / 1636 Last » Next »