Sciweavers

1045 search results - page 122 / 209
» The Use of Exceptions
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Design and Analysis of a Robust Pipelined Memory System
Abstract—Many network processing applications require wirespeed access to large data structures or a large amount of flowlevel data, but the capacity of SRAMs is woefully inadeq...
Hao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun Xu
USS
2010
13 years 6 months ago
The Case for Ubiquitous Transport-Level Encryption
Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most traffic. Moreover, the cost of doing so will only drop over time. Tcpc...
Andrea Bittau, Michael Hamburg, Mark Handley, Davi...
ICEIS
2009
IEEE
13 years 6 months ago
Mining Patterns in the Presence of Domain Knowledge
One of the main difficulties of pattern mining is to deal with items of different nature in the same itemset, which can occur in any domain except basket analysis. Indeed, if we co...
Cláudia Antunes
INTERSPEECH
2010
13 years 3 months ago
2010, a speech oddity: phonetic transcription of reversed speech
Time reversal is often used in experimental studies on language perception and understanding, but little is known on its precise impact on speech sounds. Strikingly, some studies ...
François Pellegrino, Emmanuel Ferragne, Fan...
NGC
2010
Springer
183views Communications» more  NGC 2010»
13 years 2 months ago
Brain-like Computing Based on Distributed Representations and Neurodynamics
A key to overcoming the limitations of classical artificial intelligence and to deal well with enormous amounts of information might be brain-like computing in which distributed re...
Ken Yamane, Masahiko Morita