Sciweavers

432 search results - page 77 / 87
» Improved neural network based language modelling and adaptat...
Sort
View
CCS
2003
ACM
15 years 7 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
MICRO
2007
IEEE
167views Hardware» more  MICRO 2007»
15 years 8 months ago
Informed Microarchitecture Design Space Exploration Using Workload Dynamics
Program runtime characteristics exhibit significant variation. As microprocessor architectures become more complex, their efficiency depends on the capability of adapting with wor...
Chang-Burm Cho, Wangyuan Zhang, Tao Li
SIGCOMM
2009
ACM
15 years 8 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
WSC
2000
15 years 3 months ago
Use of discrete event simulation to validate an agent based scheduling engine
This paper discusses the use of simulation in a new context. Most often QUEST is viewed as a stand-alone simulation tool to analyze and understand shop floor behavior. It has rare...
Shubhabrata Biswas, Sara Merchawi
CLEAR
2007
Springer
136views Biometrics» more  CLEAR 2007»
15 years 8 months ago
The ISL RT-07 Speech-to-Text System
Abstract. This paper describes the 2007 meeting speech-to-text system for lecture rooms developed at the Interactive Systems Laboratories (ISL), for the multiple distant microphone...
Matthias Wölfel, Sebastian Stüker, Flori...