Sciweavers

405 search results - page 66 / 81
» Avatar-centric Risk Evaluation
Sort
View
AAIM
2009
Springer
143views Algorithms» more  AAIM 2009»
14 years 7 months ago
Discrete online TSP
In this paper we introduce a discrete version of the online traveling salesman problem (DOLTSP). We represent the metric space using a weighted graph, where the server is allowed t...
Mauro Aprea, Esteban Feuerstein, Gustavo Sadovoy, ...
77
Voted
EMNLP
2009
14 years 7 months ago
Consensus Training for Consensus Decoding in Machine Translation
We propose a novel objective function for discriminatively tuning log-linear machine translation models. Our objective explicitly optimizes the BLEU score of expected n-gram count...
Adam Pauls, John DeNero, Dan Klein
ICANN
2009
Springer
14 years 7 months ago
Mental Tasks Classification for a Noninvasive BCI Application
Mapping brain activity patterns in external actions has been studied in recent decades and is the base of a brain-computer interface. This type of interface is extremely useful for...
Alexandre Ormiga G. Barbosa, David Ronald A. Diaz,...
118
Voted
IFIPTM
2009
119views Management» more  IFIPTM 2009»
14 years 7 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
AISS
2010
165views more  AISS 2010»
14 years 7 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi