Sciweavers

23557 search results - page 4241 / 4712
» Distributed Computing - Introduction
Sort
View
CIDR
2007
105views Algorithms» more  CIDR 2007»
15 years 6 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
ICWS
2010
IEEE
15 years 6 months ago
Highly Scalable Web Service Composition Using Binary Tree-Based Parallelization
Data intensive applications, e.g. in life sciences, pose new efficiency challenges to the service composition problem. Since today computing power is mainly increased by multiplica...
Patrick Hennig, Wolf-Tilo Balke
CSREASAM
2008
15 years 6 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
LREC
2010
163views Education» more  LREC 2010»
15 years 6 months ago
LIPS: A Tool for Predicting the Lexical Isolation Point of a Word
We present LIPS (Lexical Isolation Point Software), a tool for accurate lexical isolation point (IP) prediction in recordings of speech. The IP is the point in time in which a wor...
Andrew Thwaites, Jeroen Geertzen, William D. Marsl...
LREC
2010
217views Education» more  LREC 2010»
15 years 6 months ago
Building a Web Corpus of Czech
Large corpora are essential to modern methods of computational linguistics and natural language processing. In this paper, we describe an ongoing project whose aim is to build a l...
Drahomíra "johanka" Spoustová, Miros...
« Prev « First page 4241 / 4712 Last » Next »