Sciweavers

839 search results - page 38 / 168
» Development of an Evaluation Method for Office Work Producti...
Sort
View
HICSS
2012
IEEE
323views Biometrics» more  HICSS 2012»
12 years 3 months ago
The Manufacture of Potable Water: Case Analyses of Electric System Alternatives
Potable water within significant areas of the nations of the Arabian Gulf region is most frequently manufactured (cogenerated) along with electricity. The most economic process ha...
Richard D. Tabors, Siddarth Nagendraprasad, Ayoob ...
RAID
2005
Springer
14 years 27 days ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
CCS
2010
ACM
13 years 7 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
ACL
2011
12 years 11 months ago
Combining Morpheme-based Machine Translation with Post-processing Morpheme Prediction
This paper extends the training and tuning regime for phrase-based statistical machine translation to obtain fluent translations into morphologically complex languages (we build ...
Ann Clifton, Anoop Sarkar
MHCI
2009
Springer
14 years 1 months ago
Usability evaluation of OpenWeb transcoding
This paper describes collaborative work between industry and academia aimed at supporting the design and assessment of a transcoding service to support mobile phone internet brows...
Elizabeth Uruchurtu, Ellie Lockley, Chris Roast, I...