Sciweavers

562 search results - page 37 / 113
» Assessing the value of IS journals
Sort
View
HAIS
2009
Springer
15 years 2 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
BIS
2006
106views Business» more  BIS 2006»
14 years 11 months ago
Expected Utility of Content Blocks in Web Content Extraction
In this paper we discuss the possible application of new concepts in web content extraction: utility assessment, utility annealing, and dynamic aggregated document generation. Aft...
Marek Kowalkiewicz
ICTAI
2007
IEEE
15 years 4 months ago
A Methodology for Reader's Emotional State Extraction to Augment Expressions in Speech Synthesis
This paper presents a methodology for the real-time extraction of readers’ emotional state from documents as well as the representation of emotionally annotated documents into a...
Dimitrios Tsonos, Gerasimos Xydas, Georgios Kourou...
WCET
2010
14 years 7 months ago
Realism in Statistical Analysis of Worst Case Execution Times
This paper considers the use of Extreme Value Theory (EVT) to model worst-case execution times. In particular it considers the sacrifice that statistical methods make in the reali...
David Griffin, Alan Burns
WSC
2007
15 years 2 hour ago
Path-wise estimators and cross-path regressions: an application to evaluating portfolio strategies
Recently developed dual techniques allow us to evaluate a given sub-optimal dynamic portfolio policy by using the policy to construct an upper bound on the optimal value function....
Martin B. Haugh, Ashish Jain