Sciweavers

1830 search results - page 254 / 366
» Implementing a Tamper-Evident Database System
Sort
View
SIGMETRICS
2002
ACM
107views Hardware» more  SIGMETRICS 2002»
15 years 4 months ago
Simple analytic modeling of software contention
Being able to model contention for software resources (e.g., a critical section or database lock) is paramount to building performance models that capture all aspects of the delay...
Daniel A. Menascé
106
Voted
SP
2002
IEEE
15 years 4 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
ICPR
2010
IEEE
15 years 2 months ago
Automatic Pronunciation Transliteration for Chinese-English Mixed Language Keyword Spotting
This paper presents automatic pronunciation transliteration method with acoustic and contextual analysis for Chinese-English mixed language keyword spotting (KWS) system. More ofte...
Shilei Zhang, Zhiwei Shuang, Yong Qin
IJICTHD
2010
71views more  IJICTHD 2010»
15 years 1 months ago
Automatic Language Translation for Mobile SMS
Currently mobile users engage the services of a third party provider to translate an SMS text into a different language. The existing services have a number of drawbacks e.g. high ...
Swadesh Kumar Samanta, A. Achilleos, Sandro Moiron...
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto