Sciweavers

490 search results - page 73 / 98
» Operations on Records
Sort
View
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
AGI
2008
13 years 9 months ago
Fusing Animals and Humans
AI has many techniques and tools at its disposal, yet seems to be lacking some special "juice" needed to create a true being. We propose that the missing ingredients are ...
Jonathan Connell
LREC
2010
159views Education» more  LREC 2010»
13 years 9 months ago
Towards Optimal TTS Corpora
Unit selection text-to-speech systems currently produce very natural synthesized phrases by concatenating speech segments from a large database. Recently, increasing demand for de...
Didier Cadic, Cédric Boidin, Christophe d'A...
APVIS
2006
13 years 9 months ago
Integrated visualization for geometry PIG data
The geometry PIG is a system that can inspect the inside of a pipeline. The amount of pigging data is usually considerable because the system records multi-channel sensor values f...
Bok Dong Kim, Sang Ok Koo, Hyok Don Kwon, Seong Da...
MASCOTS
2003
13 years 9 months ago
SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems
— This paper introduces a new benchmark tool, SPEK (Storage Performance Evaluation Kernel module), for evaluating the performance of block-level storage systems in the presence o...
Ming Zhang, Qing Yang, Xubin He