Sciweavers

3031 search results - page 216 / 607
» Model Driven Testing Based on Test History
Sort
View
NDSS
2007
IEEE
15 years 10 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
120
Voted
NIPS
2008
15 years 5 months ago
A Scalable Hierarchical Distributed Language Model
Neural probabilistic language models (NPLMs) have been shown to be competitive with and occasionally superior to the widely-used n-gram language models. The main drawback of NPLMs...
Andriy Mnih, Geoffrey E. Hinton
SIGMOD
2009
ACM
120views Database» more  SIGMOD 2009»
16 years 3 months ago
Query interactions in database workloads
Database workloads consist of mixes of queries that run concurrently and interact with each other. In this paper, we demonstrate that query interactions can have a significant imp...
Mumtaz Ahmad, Ashraf Aboulnaga, Shivnath Babu
ICASSP
2009
IEEE
15 years 10 months ago
Speaker recognition using syllable-based constraints for cepstral frame selection
We describe a new GMM-UBM speaker recognition system that uses standard cepstral features, but selects different frames of speech for different subsystems. Subsystems, or “const...
Tobias Bocklet, Elizabeth Shriberg
101
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Unsupervised HMM Adaptation Using Page Style Clustering
In this paper we present an innovative two-stage adaptation approach for handwriting recognition that is based on clustering of similar pages in the training data. In our approach...
Huaigu Cao, Rohit Prasad, Shirin Saleem, Premkumar...