Sciweavers

1580 search results - page 136 / 316
» Modules for Crosscutting Models
Sort
View
136
Voted
ACSAC
2009
IEEE
15 years 9 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
120
Voted
ICASSP
2008
IEEE
15 years 9 months ago
Polyphase speech recognition
We propose a model for speech recognition that consists of multiple semi-synchronized recognizers operating on a polyphase decomposition of standard speech features. Specifically...
Hui Lin, Jeff Bilmes
NLPRS
2001
Springer
15 years 7 months ago
Named Entity Recognition using Machine Learning Methods and Pattern-Selection Rules
Named Entity recognition, as a task of providing important semantic information, is a critical first step in Information Extraction and QuestionAnswering system. This paper propos...
Choong-Nyoung Seon, Youngjoong Ko, Jeong-Seok Kim,...
99
Voted
WSC
2001
15 years 4 months ago
T.LoaDS abbreviated systems architecture
The Tactical Logistics Distribution System (T.LoaDS or TLoaDS) is a powerful and flexible simulation application for assessing current or future tactical or sea-based distribution...
Bob Hamber
202
Voted
AICT
2010
IEEE
240views Communications» more  AICT 2010»
14 years 6 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...