Sciweavers

916 search results - page 52 / 184
» Using redundancies to find errors
Sort
View
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 5 months ago
Comparing Different Transmission Strategies Using Turbo Codes for Nonuniform Memoryless Sources
— Nonuniform sources can be found in real world applications as uncompressed speech, text and medical images. In this paper we compare the performance of three different methods ...
Gilberto Titericz Jr., Richard Demo Souza, Javier ...
EMNLP
2007
14 years 14 days ago
Japanese Dependency Analysis Using the Ancestor-Descendant Relation
We propose a novel method for Japanese dependency analysis, which is usually reduced to the construction of a dependency tree. In deterministic approaches to this task, dependency...
Akihiro Tamura, Hiroya Takamura, Manabu Okumura
JOT
2010
125views more  JOT 2010»
13 years 9 months ago
Enhancing NetBeans with Transparent Fault Tolerance Using Meta-Level Architecture
In component-based systems, fault-tolerance concerns are typically handled by manually programmed fault containers. The purpose of fault containers is to prevent error propagation...
Martin Rytter, Bo Nørregaard Jørgens...
TC
1998
13 years 10 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
JHSN
2006
100views more  JHSN 2006»
13 years 11 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...