Results 1 - 10
of
5,566
RADIOLOGICAL ENVIRONMENTAL MONITORING
"... To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS ..."
Abstract
- Add to MetaCart
To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS
RADIOLOGICAL ENVIRONMENTAL MONITORING
"... To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS ..."
Abstract
- Add to MetaCart
To determine whether the radiological environmental monitoring programs are operational and adequate. 80521-02 INSPECTION REQUIREMENTS
Inside the black box: Raising standards through classroom assessment
- Phi Delta Kappan
, 1998
"... Raising the standards of learning that are achieved through school education is an important national priority. Governments have been vigorous in the last ten years in making changes in pursuit of this aim. National curriculum testing, the development of the GCSE, league tables of school performance ..."
Abstract
-
Cited by 564 (7 self)
- Add to MetaCart
performance, initiatives to improve school planning and management, target setting, more frequent and thorough inspection; these are all means to the end. But the sum of all of these doesn’t add up to an effective policy because something is missing. Learning is driven by what teachers and pupils do
TCP Westwood: Bandwidth estimation for enhanced transport over wireless links
, 2001
"... TCP Westwood (TCPW) is a sender-side modification of the TCP congestion window algorithm that improves upon the performance of TCP Reno in wired as well as wireless networks. The improvement is most significant in wireless networks with lossy links, since TCP Westwood relies on endto-end bandwidth e ..."
Abstract
-
Cited by 339 (34 self)
- Add to MetaCart
estimation to discriminate the cause of packet loss (congestion or wireless channel effect) which is a major problem in TCP Reno. An important distinguishing feature of TCP Westwood with respect to previous wireless TCP “extensions” is that it does not require inspection and/or interception of TCP packets
Deep Packet Inspection Using Parallel Bloom Filters
, 2004
"... this memory core, five random-memory locations are readable in a single clock cycle. So performing 35 concurrent memory operations requires seven parallel memory cores, each with one-seventh of the required array size, as Figure 5b illustrates. Because the basic Bloom filter allows any hash function ..."
Abstract
-
Cited by 224 (18 self)
- Add to MetaCart
this memory core, five random-memory locations are readable in a single clock cycle. So performing 35 concurrent memory operations requires seven parallel memory cores, each with one-seventh of the required array size, as Figure 5b illustrates. Because the basic Bloom filter allows any hash
Comparing Detection Methods For Software Requirements Inspections: A Replicated Experiment
, 1995
"... Software requirements specifications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the specification and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually, revi ..."
Abstract
-
Cited by 198 (22 self)
- Add to MetaCart
Software requirements specifications (SRS) are often validated manually. One such process is inspection, in which several reviewers independently analyze all or part of the specification and search for faults. These faults are then collected at a meeting of the reviewers and author(s). Usually
Automated trust negotiation
- In DARPA Information Survivability Conference and Exposition, volume I
, 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract
-
Cited by 241 (18 self)
- Add to MetaCart
to be protected in ATN? ” and “what are the security requirements? ” are not adequately answered. As a result, many prior methods of ATN have serious security holes. We introduce a formal framework for ATN in which we give precise, usable, and intuitive definitions of correct enforcement of policies in ATN. We
Honeycomb -- Creating Intrusion Detection Signatures Using Honeypots
- IN PROCEEDINGS OF THE SECOND WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-II
, 2004
"... This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol conformance checks on multiple levels in the protocol hierarchy to network traffic captured a honeypot system. We present ..."
Abstract
-
Cited by 209 (2 self)
- Add to MetaCart
results of running the system on an unprotected cable modem connection for 24 hours. The system successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.
Consed: a graphical tool for sequence finishing
- Genome Res
, 1998
"... Sequencing of large clones or small genomes is generally done by the shotgun approach Although complete automation of data processing in shotgun sequencing is clearly desirable and may be feasible in the near future, at present finishing still requires extensive human intervention. This is customa ..."
Abstract
-
Cited by 207 (0 self)
- Add to MetaCart
have the ability to change which information is shown, on the basis of the task at hand. Locations requiring human inspection should be efficiently pinpointed. The user manipulations required to accomplish a given task should be as natural and efficient as possible. The program should allow
Prosody-based automatic segmentation of speech into sentences and topics
- SPEECH COMMUNICATION
, 2000
"... A crucial step in processing speech audio data for information-extraction, topic detection, or browsing/playback is to segment the input into sentence and topic units. Speech segmentation is challenging, since the cues typically present for segmenting text (headers, paragraphs, punctuation) are abse ..."
Abstract
-
Cited by 205 (46 self)
- Add to MetaCart
, and requires no hand-labeling of prosodic events. Across tasks and corpora, we obtain a significant improvement over word-only models using a probabilistic combination of prosodic and lexical information. Inspection reveals that the prosodic models capture language-independent boundary indicators described
Results 1 - 10
of
5,566