Sciweavers

405 search results - page 36 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICSOC
2005
Springer
15 years 3 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
ISSA
2008
14 years 11 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
COMPUTER
2004
80views more  COMPUTER 2004»
14 years 9 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
ICASSP
2011
IEEE
14 years 1 months ago
Recent development of discriminative training using non-uniform criteria for cross-level acoustic modeling
In this paper, we extend our previous study on discriminative training using non-uniform criteria for speech recognition. The work will put emphasis on how the acoustic modeling i...
Chao Weng, Biing-Hwang Juang
EAAI
2008
115views more  EAAI 2008»
14 years 9 months ago
Supply chain coordination: A game-theory approach
In a supply chain organized as a network of autonomous enterprises, the main objective of each partner is to optimize his production and supply policy with respect to his own econ...
Jean-Claude Hennet, Yasemin Arda