Sciweavers

490 search results - page 73 / 98
» Operations on Records
Sort
View
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
AGI
2008
14 years 11 months ago
Fusing Animals and Humans
AI has many techniques and tools at its disposal, yet seems to be lacking some special "juice" needed to create a true being. We propose that the missing ingredients are ...
Jonathan Connell
LREC
2010
159views Education» more  LREC 2010»
14 years 11 months ago
Towards Optimal TTS Corpora
Unit selection text-to-speech systems currently produce very natural synthesized phrases by concatenating speech segments from a large database. Recently, increasing demand for de...
Didier Cadic, Cédric Boidin, Christophe d'A...
APVIS
2006
14 years 11 months ago
Integrated visualization for geometry PIG data
The geometry PIG is a system that can inspect the inside of a pipeline. The amount of pigging data is usually considerable because the system records multi-channel sensor values f...
Bok Dong Kim, Sang Ok Koo, Hyok Don Kwon, Seong Da...
71
Voted
MASCOTS
2003
14 years 11 months ago
SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems
— This paper introduces a new benchmark tool, SPEK (Storage Performance Evaluation Kernel module), for evaluating the performance of block-level storage systems in the presence o...
Ming Zhang, Qing Yang, Xubin He