Sciweavers

2386 search results - page 448 / 478
» Database Security 2000
Sort
View
NETWORK
2008
139views more  NETWORK 2008»
15 years 2 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
SPEECH
2011
14 years 9 months ago
The Romanian speech synthesis (RSS) corpus: Building a high quality HMM-based speech synthesis system using a high sampling rate
This paper first introduces a newly-recorded high quality Romanian speech corpus designed for speech synthesis, called “RSS”, along with Romanian front-end text processing mo...
Adriana Stan, Junichi Yamagishi, Simon King, Matth...
TDSC
2010
119views more  TDSC 2010»
14 years 9 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
SIGUCCS
2000
ACM
15 years 6 months ago
Three Years in the Solution Center
After thirty-plus years of making small “mid-course corrections” types of changes to the support paradigm, many on the Iowa State University campus thought it was time to make...
Frank Poduska
IJCAI
2003
15 years 3 months ago
Integrating Background Knowledge Into Text Classification
We present a description of three different algorithms that use background knowledge to improve text classifiers. One uses the background knowledge as an index into the set of tra...
Sarah Zelikovitz, Haym Hirsh