Sciweavers

1812 search results - page 320 / 363
» Signal Processing in Large Systems: a New Paradigm
Sort
View
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 11 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
ENTCS
2011
99views more  ENTCS 2011»
13 years 2 months ago
Symmetry and Composition in Probabilistic Theories
The past decade has seen a remarkable resurgence of the old programme of finding more or less a priori axioms for the mathematical framework of quantum mechanics. The new impetus...
Alexander Wilce
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
14 years 2 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi
IJCNLP
2004
Springer
14 years 1 months ago
Chinese Treebanks and Grammar Extraction
Preparation of knowledge bank is a very difficult task. In this paper, we discuss the knowledge extraction from the manually examined Sinica Treebank. Categorical information, wor...
Keh-Jiann Chen, Yu-Ming Hsieh
ICDCS
2002
IEEE
14 years 24 days ago
ControlWare: A Middleware Architecture for Feedback Control of Software Performance
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded sys...
Ronghua Zhang, Chenyang Lu, Tarek F. Abdelzaher, J...