Sciweavers

789 search results - page 56 / 158
» Pushing using Compliance
Sort
View
ICSE
2007
IEEE-ACM
16 years 1 months ago
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis
Server page technique is commonly used for implementing web application user interfaces. Server pages can represent many similar web pages in a generic form. Yet our previous stud...
Damith C. Rajapakse, Stan Jarzabek
ICASSP
2010
IEEE
15 years 1 months ago
Language recognition using deep-structured conditional random fields
We present a novel language identification technique using our recently developed deep-structured conditional random fields (CRFs). The deep-structured CRF is a multi-layer CRF mo...
Dong Yu, Shizhen Wang, Zahi Karam, Li Deng
VLDB
2002
ACM
165views Database» more  VLDB 2002»
15 years 1 months ago
RTMonitor: Real-Time Data Monitoring Using Mobile Agent Technologies
RTMonitor is a real-time data management system for traffic navigation applications. In our system, mobile vehicles initiate time-constrained navigation requests and RTMonitor cal...
Kam-yiu Lam, Alan Kwan, Krithi Ramamritham
INFOCOM
2008
IEEE
15 years 7 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge
CORR
2007
Springer
131views Education» more  CORR 2007»
15 years 1 months ago
How to use the Scuba Diving metaphor to solve problem with neutrality ?
Abstract. We proposed a new search heuristic using the scuba diving metaphor. This approach is based on the concept of evolvability and tends to exploit neutrality which exists in ...
Philippe Collard, Sébastien Vérel, M...