Sciweavers

6978 search results - page 1232 / 1396
» On Proofs in System P
Sort
View
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
14 years 3 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
ICASSP
2008
IEEE
14 years 3 months ago
A tempo-insensitive distance measure for cover song identification based on chroma features
We present a distance measure between audio files designed to identify cover songs, which are new renditions of previously recorded songs. For each song we compute the chromagram...
Jesper Højvang Jensen, Mads Græsb&osl...
ICASSP
2008
IEEE
14 years 3 months ago
Temporal selective dereverberation of noisy speech using one microphone
Reverberant speech can be described as sounding distant with noticeable coloration and echo. These detrimental perceptual effects are caused by early and late reflections, respec...
Emanuel A. P. Habets, Nikolay D. Gaubitch, Patrick...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 3 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
IEEEPACT
2008
IEEE
14 years 3 months ago
A tuning framework for software-managed memory hierarchies
Achieving good performance on a modern machine with a multi-level memory hierarchy, and in particular on a machine with software-managed memories, requires precise tuning of progr...
Manman Ren, Ji Young Park, Mike Houston, Alex Aike...
« Prev « First page 1232 / 1396 Last » Next »