Sciweavers

691 search results - page 93 / 139
» Design comparisons for procurement systems
Sort
View
SICHERHEIT
2010
14 years 10 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
90
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Open-set speaker identification in broadcast news
In this paper, we examine the problem of text-independent open-set speaker identification (OS-SI) in broadcast news. Particularly, the impact of the population of registered speak...
Chao Gao, Guruprasad Saikumar, Amit Srivastava, Pr...
102
Voted
ACL
2012
13 years 2 months ago
PORT: a Precision-Order-Recall MT Evaluation Metric for Tuning
Many machine translation (MT) evaluation metrics have been shown to correlate better with human judgment than BLEU. In principle, tuning on these metrics should yield better syste...
Boxing Chen, Roland Kuhn, Samuel Larkin
SCESM
2006
ACM
247views Algorithms» more  SCESM 2006»
15 years 6 months ago
Automating software architecture exploration with M2Aspects
An important step in the development of large-scale distributed reactive systems is the design of effective system architectures. The early availability of prototypes facilitates...
Ingolf H. Krüger, Gunny Lee, Michael Meisinge...
91
Voted
BMCBI
2005
87views more  BMCBI 2005»
15 years 12 days ago
BioCreAtIvE Task 1A: gene mention finding evaluation
Background: The biological research literature is a major repository of knowledge. As the amount of literature increases, it will get harder to find the information of interest on...
Alexander S. Yeh, Alexander A. Morgan, Marc E. Col...