Sciweavers

2193 search results - page 402 / 439
» A System for Performance Evaluation of Embedded Software
Sort
View
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
ANLP
2000
157views more  ANLP 2000»
15 years 5 months ago
Experiments on Sentence Boundary Detection
This paper explores the problem of identifying sentence boundaries in the transcriptions produced by automatic speech recognition systems. An experiment which determines the level...
Mark Stevenson, Robert J. Gaizauskas
SIGIR
2004
ACM
15 years 9 months ago
Web-page classification through summarization
Web-page classification is much more difficult than pure-text classification due to a large variety of noisy information embedded in Web pages. In this paper, we propose a new Web...
Dou Shen, Zheng Chen, Qiang Yang, Hua-Jun Zeng, Be...
IWCMC
2010
ACM
15 years 9 months ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 7 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan