Sciweavers

1030 search results - page 25 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
NDSS
2009
IEEE
14 years 3 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
CORR
1999
Springer
93views Education» more  CORR 1999»
13 years 8 months ago
Empirically Evaluating an Adaptable Spoken Dialogue System
Abstract. Recent technological advances have made it possible to build real-time, interactive spoken dialogue systems for a wide variety of applications. However, when users do not...
Diane J. Litman, Shimei Pan
SIGCOMM
2004
ACM
14 years 2 months ago
A system for authenticated policy-compliant routing
Internet end users and ISPs alike have little control over how packets are routed outside of their own AS, restricting their ability to achieve levels of performance, reliability,...
Barath Raghavan, Alex C. Snoeren
SAINT
2002
IEEE
14 years 1 months ago
Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Hideo Masuda, Michio Nakanishi, Masahide Nakamura,...
AI
1998
Springer
14 years 29 days ago
Test-Driving TANKA: Evaluating a Semi-automatic System of Text Analysis for Knowledge Acquisition
The evaluation of a large implemented natural language processing system involves more than its application to a common performance task. Such tasks have been used in the message u...
Ken Barker, Sylvain Delisle, Stan Szpakowicz