Sciweavers

353 search results - page 59 / 71
» Dynamic search in peer-to-peer networks
Sort
View
NAACL
1994
13 years 10 months ago
A One Pass Decoder Design For Large Vocabulary Recognition
To achieve reasonable accuracy in large vocabulary speech recognition systems, it is important to use detailed acoustic models together with good long span language models. For ex...
J. J. Odell, V. Valtchev, Philip C. Woodland, S. J...
JCP
2008
125views more  JCP 2008»
13 years 8 months ago
Comparative Analysis of Resource Discovery Approaches in Grid Computing
Grid technologies enable the sharing of a wide variety of distributed resources. To utilize these resources, effective Resource Management systems are needed. Resource Management s...
Anju Sharma, Seema Bawa
PERCOM
2008
ACM
13 years 8 months ago
CASD: Management of a context-aware service directory
Traditional web service discovery is strongly related to the use of service directories. Especially in the case of mobile web services, where both service requestors and providers...
Christos Doulkeridis, Michalis Vazirgiannis
STOC
2010
ACM
170views Algorithms» more  STOC 2010»
14 years 1 months ago
Connectivity oracles for failure prone graphs
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...
Ran Duan, Seth Pettie
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 9 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...