Sciweavers

1363 search results - page 195 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
CSCW
2011
ACM
14 years 6 months ago
Empirical software engineering at Microsoft Research
We describe the activities of the Empirical Software Engineering (ESE) group at Microsoft Research. We highlight our research themes and activities using examples from our researc...
Christian Bird, Brendan Murphy, Nachiappan Nagappa...
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 5 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
96
Voted
ICASSP
2011
IEEE
14 years 2 months ago
A simplified Subspace Gaussian Mixture to compact acoustic models for speech recognition
Speech recognition applications are known to require a significant amount of resources (memory, computing power). However, embedded speech recognition systems, such as in mobile p...
Mohamed Bouallegue, Driss Matrouf, Georges Linares
CHI
2011
ACM
14 years 2 months ago
MonoTrans2: a new human computation system to support monolingual translation
In this paper, we present MonoTrans2, a new user interface to support monolingual translation; that is, translation by people who speak only the source or target language, but not...
Chang Hu, Benjamin B. Bederson, Philip Resnik, Yak...
INFOCOM
2011
IEEE
14 years 2 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...