Sciweavers

390 search results - page 28 / 78
» The Factors that Affect the Implementation Success of IS
Sort
View
ISSRE
2010
IEEE
13 years 6 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
ICDCS
2009
IEEE
14 years 6 months ago
The Impact of Communication Models on Routing-Algorithm Convergence
Autonomous routing algorithms, such as BGP, are intended to reach a globally consistent set of routes after nodes iteratively and independently collect, process, and share network...
Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. W...
CSL
2008
Springer
13 years 8 months ago
Applying an analysis of acted vocal emotions to improve the simulation of synthetic speech
: All speech produced by humans includes information about the speaker, including conveying the emotional state of the speaker. It is thus desirable to include vocal affect in any ...
Iain R. Murray, John L. Arnott
SIGMOD
2002
ACM
118views Database» more  SIGMOD 2002»
14 years 9 months ago
Compressing SQL workloads
Recently several important relational database tasks such as index selection, histogram tuning, approximate query processing, and statistics selection have recognized the importan...
Surajit Chaudhuri, Ashish Kumar Gupta, Vivek R. Na...
MHCI
2009
Springer
14 years 3 months ago
Optimizing user interaction for mobile web browsing
The small form-factor of mobile handsets and the longer, variable latency of cellular networks negatively affect user experience in mobile web related activities. In this paper we...
Dong Zhou, Ajay Chander, Hiroshi Inamura