Sciweavers

3341 search results - page 620 / 669
» A Communication Virtual Machine
Sort
View
CN
2006
89views more  CN 2006»
13 years 8 months ago
A flexible concast-based grouping service
Abstract. We present a scalable and flexible grouping service based on concast and best-effort single-source multicast. The service assigns participating end systems to specific gr...
Amit Sehgal, Kenneth L. Calvert, Jim Griffioen
IJPP
2008
74views more  IJPP 2008»
13 years 7 months ago
Bandwidth Efficient All-to-All Broadcast on Switched Clusters
We develop an all-to-all broadcast scheme that achieves maximum bandwidth efficiency for clusters with tree topologies. Using our scheme for clusters with cut-through switches, an...
Ahmad Faraj, Pitch Patarasuk, Xin Yuan
JCIT
2008
124views more  JCIT 2008»
13 years 7 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
IR
2006
13 years 7 months ago
Table extraction for answer retrieval
The ability to find tables and extract information from them is a necessary component of many information retrieval tasks. Documents often contain tables in order to communicate d...
Xing Wei, W. Bruce Croft, Andrew McCallum
NETWORK
2008
94views more  NETWORK 2008»
13 years 7 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo