Sciweavers

7124 search results - page 1348 / 1425
» Programming Languages and Operating Systems
Sort
View
CN
2007
137views more  CN 2007»
13 years 10 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
13 years 10 months ago
A Randomized Queueless Algorithm for Breadth-First Search
First Come First Served is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems [28, 11], scheduling web ...
K. Subramani, Kamesh Madduri
INFORMATICALT
2007
106views more  INFORMATICALT 2007»
13 years 10 months ago
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition
This paper describes a framework for making up a set of syllables and phonemes that subsequently is used in the creation of acoustic models for continuous speech recognition of Lit...
Sigita Laurinciukaite, Antanas Lipeika
AIR
2004
130views more  AIR 2004»
13 years 10 months ago
A Hybrid Framework for Over-Constrained Generalized
Abstract. In this work we study an over-constrained scheduling problem where constraints cannot be relaxed. This problem originates from a local defense agency where activities to ...
Andrew Lim, Brian Rodrigues, Ramesh Thangarajo, Fe...
ML
2000
ACM
244views Machine Learning» more  ML 2000»
13 years 9 months ago
Learnable Evolution Model: Evolutionary Processes Guided by Machine Learning
A new class of evolutionary computation processes is presented, called Learnable Evolution Model or LEM. In contrast to Darwinian-type evolution that relies on mutation, recombinat...
Ryszard S. Michalski
« Prev « First page 1348 / 1425 Last » Next »