Sciweavers

620 search results - page 61 / 124
» Methods and Practical Issues in Evaluating Alignment Techniq...
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
15 years 4 months ago
Efficient System-Enforced Deterministic Parallelism
Deterministic execution offers many benefits for debugging, fault tolerance, and security. Current methods of executing parallel programs deterministically, however, often incur h...
Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford
MM
2003
ACM
123views Multimedia» more  MM 2003»
15 years 9 months ago
Music scale modeling for melody matching
Several time series matching techniques have been proposed for content-based music retrieval. These techniques represent a melody by a time series of pitch values and use time war...
Yongwei Zhu, Mohan S. Kankanhalli
ISPD
2000
ACM
145views Hardware» more  ISPD 2000»
15 years 8 months ago
A snap-on placement tool
The standard cell placement problem has been extensively studied in the past twenty years. Many approaches were proposed and proven e ective in practice. However, successful place...
Xiaojian Yang, Maogang Wang, Kenneth Eguro, Majid ...
ICC
2007
IEEE
15 years 10 months ago
Locating Congested Segments on the Internet by Clustering the Delay Performance of Multiple Paths
— A practical method of locating congested segments on the Internet by periodic end-to-end packet delay measurements along multiple paths is presented. This method is a network t...
Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Mas...
RAID
2010
Springer
15 years 2 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo