Sciweavers

156 search results - page 23 / 32
» What are Cycle-Stealing Systems Good For
Sort
View
PPPJ
2003
ACM
14 years 19 days ago
A stochastic approach to automated design improvement
The object-oriented approach to software development facilitates and encourages programming practices that increase reusability, correctness and maintainability in code. This is a...
Mark Kent O'Keeffe, Mel Ó Cinnéide
SIGCOMM
2000
ACM
13 years 11 months ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...
ASIACRYPT
2006
Springer
13 years 11 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
IMECS
2007
13 years 8 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
CSL
2006
Springer
13 years 7 months ago
Using quality measures for multilevel speaker recognition
The use of quality information for multilevel speaker recognition systems is addressed in this contribution. From a definition of what constitutes a quality measure, two applicati...
Daniel Garcia-Romero, Julian Fiérrez-Aguila...