Sciweavers

668 search results - page 21 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
LREC
2010
260views Education» more  LREC 2010»
13 years 8 months ago
Automatic Detection of Syllable Boundaries in Spontaneous Speech
This paper presents the outline and performance of an automatic syllable boundary detection system. The syllabification of phonemes is performed with a rule-based system, implemen...
Brigitte Bigi, Christine Meunier, Irina Nesterenko...
NAACL
1994
13 years 8 months ago
The Automatic Component of the LINGSTAT Machine-Aided Translation System
We present the newest implementation of the LINGSTAT machine-aided translation system. The moat signiflcsat change from earlier versions is a new set of modules that produce a dra...
Jonathan Yamron, James Cant, Anne Demedts, Taiko D...
FORTE
2004
13 years 8 months ago
Automatized Verification of Ad Hoc Routing Protocols
Numerous specialized ad hoc routing protocols are currently proposed for use, or being implemented. Few of them have been subjected to formal verification. This paper evaluates two...
Oskar Wibling, Joachim Parrow, Arnold Neville Pear...
HPCA
2009
IEEE
14 years 8 months ago
Design and implementation of software-managed caches for multicores with local memory
Heterogeneous multicores, such as Cell BE processors and GPGPUs, typically do not have caches for their accelerator cores because coherence traffic, cache misses, and latencies fr...
Sangmin Seo, Jaejin Lee, Zehra Sura
CCS
2007
ACM
14 years 1 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...