Sciweavers

1156 search results - page 51 / 232
» The PENG System: Practice and Experience
Sort
View
ACSAC
2005
IEEE
15 years 4 months ago
Defensive Execution of Transactional Processes against Attacks
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the...
Meng Yu, Wanyu Zang, Peng Liu
ACSAC
2009
IEEE
15 years 6 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
86
Voted
CCS
2007
ACM
15 years 5 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
ICC
2008
IEEE
137views Communications» more  ICC 2008»
15 years 5 months ago
On the Effect of Localization Errors on Geographic Routing in Sensor Networks
—Recently, network localization systems that are based on inter-node ranges have received significant attention. Geographic routing has been considered an application which can u...
Bo Peng, Rainer Mautz, Andrew H. Kemp, Washington ...
CSL
2010
Springer
14 years 11 months ago
Monaural speech separation based on MAXVQ and CASA for robust speech recognition
Robustness is one of the most important topics for automatic speech recognition (ASR) in practical applications. Monaural speech separation based on computational auditory scene a...
Peng Li, Yong Guan, Shijin Wang, Bo Xu, Wenju Liu