Sciweavers

620 search results - page 61 / 124
» Methods and Practical Issues in Evaluating Alignment Techniq...
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
15 years 1 months ago
Efficient System-Enforced Deterministic Parallelism
Deterministic execution offers many benefits for debugging, fault tolerance, and security. Current methods of executing parallel programs deterministically, however, often incur h...
Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford
MM
2003
ACM
123views Multimedia» more  MM 2003»
15 years 6 months ago
Music scale modeling for melody matching
Several time series matching techniques have been proposed for content-based music retrieval. These techniques represent a melody by a time series of pitch values and use time war...
Yongwei Zhu, Mohan S. Kankanhalli
ISPD
2000
ACM
145views Hardware» more  ISPD 2000»
15 years 5 months ago
A snap-on placement tool
The standard cell placement problem has been extensively studied in the past twenty years. Many approaches were proposed and proven e ective in practice. However, successful place...
Xiaojian Yang, Maogang Wang, Kenneth Eguro, Majid ...
ICC
2007
IEEE
15 years 7 months ago
Locating Congested Segments on the Internet by Clustering the Delay Performance of Multiple Paths
— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
RAID
2010
Springer
14 years 12 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo