Sciweavers

3686 search results - page 552 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ENGL
2006
111views more  ENGL 2006»
13 years 8 months ago
Voice Recognition with Neural Networks, Type-2 Fuzzy Logic and Genetic Algorithms
We describe in this paper the use of neural networks, fuzzy logic and genetic algorithms for voice recognition. In particular, we consider the case of speaker recognition by analyz...
Patricia Melin, Jérica Urías, Daniel...
IC
2003
13 years 9 months ago
WODA - A Web Services Generator
— The default storage system for the World Wide Web is the file system- the concept of a database is not built into the core of the HTTP protocols or into the HTML language. But ...
Ziga Turk
HT
1993
ACM
14 years 7 days ago
Concurrency Control in Collaborative Hypertext Systems
Traditional concurrency control techniques for database systems (transaction management based on locking protocols) have been successful in many multiuser settings, but these tech...
Uffe Kock Wiil, John J. Leggett
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
14 years 16 days ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim