Sciweavers

3910 search results - page 702 / 782
» Analyzing Cross-Connected Networks
Sort
View
CCS
2010
ACM
13 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
SYSTOR
2010
ACM
13 years 10 months ago
Empirical quantification of opportunities for content adaptation in web servers
A basic problem in the management of web servers is capacity planning: you want enough capacity to be able to serve peak loads, but not too much so as to avoid excessive costs. It...
Michael Gopshtein, Dror G. Feitelson
ICASSP
2010
IEEE
13 years 10 months ago
Morphology-based and sub-word language modeling for Turkish speech recognition
We explore morphology-based and sub-word language modeling approaches proposed for morphologically rich languages, and evaluate and contrast them for Turkish broadcast news transc...
Hasim Sak, Murat Saraclar, Tunga Güngör
GLOBECOM
2008
IEEE
13 years 10 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
AR
2007
138views more  AR 2007»
13 years 10 months ago
Integrating robotics and neuroscience: brains for robots, bodies for brains
—Researchers in robotics and artificial intelligence have often looked at biology as a source of inspiration for solving their problems. From the opposite perspective, neuroscie...
Michele Rucci, Daniel Bullock, Fabrizio Santini