• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,566
Next 10 →

RADIOLOGICAL ENVIRONMENTAL MONITORING

by unknown authors
"... To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS ..."
Abstract - Add to MetaCart
To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS

RADIOLOGICAL ENVIRONMENTAL MONITORING

by unknown authors
"... To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS ..."
Abstract - Add to MetaCart
To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS

Inside the black box: Raising standards through classroom assessment

by Paul Black, Dylan Wiliam - Phi Delta Kappan , 1998
"... Raising the standards of learning that are achieved through school education is an important national priority. Governments have been vigorous in the last ten years in making changes in pursuit of this aim. National curriculum testing, the development of the GCSE, league tables of school performance ..."
Abstract - Cited by 564 (7 self) - Add to MetaCart
performance, initiatives to improve school planning and management, target setting, more frequent and thorough inspection; these are all means to the end. But the sum of all of these doesn’t add up to an effective policy because something is missing. Learning is driven by what teachers and pupils do

TCP Westwood: Bandwidth estimation for enhanced transport over wireless links

by Saverio Mascolo, Claudio Casetti, Mario Gerla, et al. , 2001
"... TCP Westwood (TCPW) is a sender-side modification of the TCP congestion window algorithm that improves upon the performance of TCP Reno in wired as well as wireless networks. The improvement is most significant in wireless networks with lossy links, since TCP Westwood relies on endto-end bandwidth e ..."
Abstract - Cited by 339 (34 self) - Add to MetaCart
estimation to discriminate the cause of packet loss (congestion or wireless channel effect) which is a major problem in TCP Reno. An important distinguishing feature of TCP Westwood with respect to previous wireless TCP “extensions” is that it does not require inspection and/or interception of TCP packets

Deep Packet Inspection Using Parallel Bloom Filters

by Sarang Dharmapurikar, Praveen Krishnamurthy, Todd Sproull, John Lockwood, Line Speeds , 2004
"... this memory core, five random-memory locations are readable in a single clock cycle. So performing 35 concurrent memory operations requires seven parallel memory cores, each with one-seventh of the required array size, as Figure 5b illustrates. Because the basic Bloom filter allows any hash function ..."
Abstract - Cited by 224 (18 self) - Add to MetaCart
this memory core, five random-memory locations are readable in a single clock cycle. So performing 35 concurrent memory operations requires seven parallel memory cores, each with one-seventh of the required array size, as Figure 5b illustrates. Because the basic Bloom filter allows any hash

Comparing Detection Methods For Software Requirements Inspections: A Replicated Experiment

by Adam A. Porter, Lawrence G. Votta, Jr., Jr. Victor, Victor R. Basili , 1995
"... Software requirements specifications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the specification and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually, revi ..."
Abstract - Cited by 198 (22 self) - Add to MetaCart
Software requirements specifications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the specification and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually

Automated trust negotiation

by William H. Winsborough, Ninghui Li - In DARPA Information Survivability Conference and Exposition, volume I , 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract - Cited by 241 (18 self) - Add to MetaCart
to be protected in ATN? ” and “what are the security requirements? ” are not adequately answered. As a result, many prior methods of ATN have serious security holes. We introduce a formal framework for ATN in which we give precise, usable, and intuitive definitions of correct enforcement of policies in ATN. We

Honeycomb -- Creating Intrusion Detection Signatures Using Honeypots

by Christian Kreibich, Jon Crowcroft - IN PROCEEDINGS OF THE SECOND WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-II , 2004
"... This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network traffic captured a honeypot system. We present ..."
Abstract - Cited by 209 (2 self) - Add to MetaCart
results of running the system on an unprotected cable modem connection for 24 hours. The system successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.

Consed: a graphical tool for sequence finishing

by David Gordon , Chris Abajian , Phil Green - Genome Res , 1998
"... Sequencing of large clones or small genomes is generally done by the shotgun approach Although complete automation of data processing in shotgun sequencing is clearly desirable and may be feasible in the near future, at present finishing still requires extensive human intervention. This is customa ..."
Abstract - Cited by 207 (0 self) - Add to MetaCart
have the ability to change which information is shown, on the basis of the task at hand. Locations requiring human inspection should be efficiently pinpointed. The user manipulations required to accomplish a given task should be as natural and efficient as possible. The program should allow

Prosody-based automatic segmentation of speech into sentences and topics

by Elizabeth Shriberg, Andreas Stolcke, Dilek Hakkani-Tür, Gökhan Tür - SPEECH COMMUNICATION , 2000
"... A crucial step in processing speech audio data for information-extraction, topic detection, or browsing/playback is to segment the input into sentence and topic units. Speech segmentation is challenging, since the cues typically present for segmenting text (headers, paragraphs, punctuation) are abse ..."
Abstract - Cited by 205 (46 self) - Add to MetaCart
, and requires no hand-labeling of prosodic events. Across tasks and corpora, we obtain a significant improvement over word-only models using a probabilistic combination of prosodic and lexical information. Inspection reveals that the prosodic models capture language-independent boundary indicators described
Next 10 →
Results 1 - 10 of 5,566
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University