Sciweavers

16160 search results - page 3052 / 3232
» How to approach humans
Sort
View
IADIS
2004
13 years 9 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
NSDI
2004
13 years 9 months ago
TimeLine: A High Performance Archive for a Distributed Object Store
This paper describes TimeLine, an efficient archive service for a distributed storage system. TimeLine allows users to take snapshots on demand. The archive is stored online so th...
Chuang-Hue Moh, Barbara Liskov
MASCOTS
2003
13 years 9 months ago
Bottleneck Estimation for Load Control Gateways
Providing Quality of Service (QoS) to inelastic data transmissions in a cost-efficient, highly scalable, and realistic fashion in IP networks remains a challenging research issue....
Krishna Pandit, Jens Schmitt, Martin Karsten, Ralf...
NIPS
2003
13 years 9 months ago
A Classification-based Cocktail-party Processor
At a cocktail party, a listener can selectively attend to a single voice and filter out other acoustical interferences. How to simulate this perceptual ability remains a great cha...
Nicoleta Roman, DeLiang L. Wang, Guy J. Brown
ANLP
2000
141views more  ANLP 2000»
13 years 9 months ago
Aggressive Morphology for Robust Lexical Coverage
This paper describes an approach to providing lexical information for natural language processing in unrestricted domains. A system of approximately 1200 morphological rules is us...
William A. Woods
« Prev « First page 3052 / 3232 Last » Next »