Sciweavers

26496 search results - page 92 / 5300
» An Approach to Computing Ethics
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
ACL
2012
13 years 6 months ago
Discriminative Pronunciation Modeling: A Large-Margin, Feature-Rich Approach
We address the problem of learning the mapping between words and their possible pronunciations in terms of sub-word units. Most previous approaches have involved generative modeli...
Hao Tang, Joseph Keshet, Karen Livescu
FECS
2007
138views Education» more  FECS 2007»
15 years 5 months ago
Computing Branches Out: On Revitalizing Computing Education
Computing professionals are employed in so many different ways that it is difficult to even define the common foundation that all of them should master; however, a single degree ...
Ljubomir Perkovic, Amber Settle
PAM
2012
Springer
13 years 11 months ago
SyFi: A Systematic Approach for Estimating Stateful Firewall Performance
Due to the lack of a standardized methodology for reporting firewall performance, current datasheets are designed for marketing and provide inflated throughput measurements obtai...
Yordanos Beyene, Michalis Faloutsos, Harsha V. Mad...
CVPR
2012
IEEE
13 years 6 months ago
A codebook-free and annotation-free approach for fine-grained image categorization
Fine-grained categorization refers to the task of classifying objects that belong to the same basic-level class (e.g. different bird species) and share similar shape or visual app...
Bangpeng Yao, Gary R. Bradski, Fei-Fei Li