Sciweavers

1456 search results - page 84 / 292
» Two Techniques to Improve Finite Model Search
Sort
View
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
RTSS
1999
IEEE
14 years 6 days ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...
ECIR
2009
Springer
14 years 5 months ago
Joint Ranking for Multilingual Web Search
Ranking for multilingual information retrieval (MLIR) is a task to rank documents of different languages solely based on their relevancy to the query regardless of query’s langu...
Wei Gao, Cheng Niu, Ming Zhou, Kam-Fai Wong
CGO
2007
IEEE
14 years 2 months ago
Rapidly Selecting Good Compiler Optimizations using Performance Counters
Applying the right compiler optimizations to a particular program can have a significant impact on program performance. Due to the non-linear interaction of compiler optimization...
John Cavazos, Grigori Fursin, Felix V. Agakov, Edw...
ACL
2012
11 years 10 months ago
Fast and Scalable Decoding with Language Model Look-Ahead for Phrase-based Statistical Machine Translation
In this work we present two extensions to the well-known dynamic programming beam search in phrase-based statistical machine translation (SMT), aiming at increased efficiency of ...
Joern Wuebker, Hermann Ney, Richard Zens