Sciweavers

32032 search results - page 6239 / 6407
» Verified programming in Guru
Sort
View
75
Voted
COLING
2000
15 years 29 days ago
Language Identification In Unknown Signals
This paper describes algorithms and software developed to characterise and detect generic intelligent language-like features iu an input signal, using Natural Language Learning te...
John R. Elliott, Eric Atwell, Bill Whyte
109
Voted
COOTS
1997
15 years 29 days ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
LISA
2000
15 years 29 days ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
PICS
1998
15 years 29 days ago
The Important Roles of Inks and Media in the Light Fading Stability of Inkjet Prints
In the fine art field, the high-resolution inkjet printers made by IRIS Graphics, Inc. have for more than 7 years remained the preferred direct digital output device for printing ...
Henry Wilhelm, Mark H. McCormick-Goodhart
SPIESR
1998
151views Database» more  SPIESR 1998»
15 years 29 days ago
Synthesizing Parallel Imaging Applications Using the CAP Computer-Aided Parallelization Tool
Abstract. Imaging applications such as filtering, image transforms and compression/decompression require vast amounts of computing power when applied to large data sets. These appl...
Benoit A. Gennart, Marc Mazzariol, Vincent Messerl...
« Prev « First page 6239 / 6407 Last » Next »