Sciweavers

11394 search results - page 33 / 2279
» Error-Correcting Data Structures
Sort
View
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 5 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SIGCOMM
1997
ACM
15 years 4 months ago
Parity-Based Loss Recovery for Reliable Multicast Transmission
We investigate how FEC (Forward Error Correction) can be combined with ARQ (Automatic Repeat Request) to achieve scalable reliable multicast transmission. We consider the two scen...
Jörg Nonnenmacher, Ernst Biersack, Donald F. ...
DICTA
2007
15 years 1 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
COLING
1996
15 years 1 months ago
A Gradual Refinement Model for A Robust Thai Morphological Analyzer
This work attempts to provide a robust Thai morphological analyzer which can automatically assign the correct part-of-speech tag to the correct word with time and space efficiency...
Asanee Kawtrakul, Chalatip Thumkanon, Thitima Jamj...
TNN
2010
143views Management» more  TNN 2010»
14 years 6 months ago
Using unsupervised analysis to constrain generalization bounds for support vector classifiers
Abstract--A crucial issue in designing learning machines is to select the correct model parameters. When the number of available samples is small, theoretical sample-based generali...
Sergio Decherchi, Sandro Ridella, Rodolfo Zunino, ...