Sciweavers

1830 search results - page 254 / 366
» Implementing a Tamper-Evident Database System
Sort
View
106
Voted
SIGMETRICS
2002
ACM
107views Hardware» more  SIGMETRICS 2002»
15 years 13 days ago
Simple analytic modeling of software contention
Being able to model contention for software resources (e.g., a critical section or database lock) is paramount to building performance models that capture all aspects of the delay...
Daniel A. Menascé
74
Voted
SP
2002
IEEE
15 years 13 days ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
83
Voted
ICPR
2010
IEEE
14 years 10 months ago
Automatic Pronunciation Transliteration for Chinese-English Mixed Language Keyword Spotting
This paper presents automatic pronunciation transliteration method with acoustic and contextual analysis for Chinese-English mixed language keyword spotting (KWS) system. More ofte...
Shilei Zhang, Zhiwei Shuang, Yong Qin
IJICTHD
2010
71views more  IJICTHD 2010»
14 years 10 months ago
Automatic Language Translation for Mobile SMS
Currently mobile users engage the services of a third party provider to translate an SMS text into a different language. The existing services have a number of drawbacks e.g. high ...
Swadesh Kumar Samanta, A. Achilleos, Sandro Moiron...
118
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto