Sciweavers

9245 search results - page 1653 / 1849
» Virtualization
Sort
View
145
Voted
TSD
2010
Springer
15 years 1 months ago
Recovery of Rare Words in Lecture Speech
The vocabulary used in speech usually consists of two types of words: a limited set of common words, shared across multiple documents, and a virtually unlimited set of rare words, ...
Stefan Kombrink, Mirko Hannemann, Lukas Burget, Hy...
156
Voted
VLDB
2010
ACM
190views Database» more  VLDB 2010»
15 years 1 months ago
Continuous authentication on relational streams
According to the database outsourcing model, a data owner delegates database functionality to a thirdparty service provider, which answers queries received from clients. Authentic...
Stavros Papadopoulos, Yin Yang, Dimitris Papadias
148
Voted
VTC
2010
IEEE
102views Communications» more  VTC 2010»
15 years 1 months ago
Trace-Based Evaluation of Rate Adaptation Schemes in Vehicular Environments
Abstract—There has been a variety of rate adaptation solutions proposed for both indoor and mobile scenarios. However, dynamic channel changing conditions (e.g., temporal channel...
Kevin C. Lee, Juan M. Navarro, Tin Y. Chong, Uichi...
146
Voted
ACL
2010
15 years 1 months ago
Demonstration of a Prototype for a Conversational Companion for Reminiscing about Images
This paper describes an initial prototype demonstrator of a Companion, designed as a platform for novel approaches to the following: 1) The use of Information Extraction (IE) tech...
Yorick Wilks, Roberta Catizone, Alexiei Dingli, We...
135
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
« Prev « First page 1653 / 1849 Last » Next »