Sciweavers

1548 search results - page 185 / 310
» Estimating Software Vulnerabilities
Sort
View
COMSWARE
2008
IEEE
15 years 6 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
105
Voted
ARCS
2006
Springer
15 years 3 months ago
The Robustness of Resource Allocations in Parallel and Distributed Computing Systems
This corresponds to the material in the invited keynote presentation by H. J. Siegel, summarizing the research in [2, 23]. Resource allocation decisions in heterogeneous parallel a...
Vladimir Shestak, Howard Jay Siegel, Anthony A. Ma...
SOCO
2008
Springer
14 years 11 months ago
Fuzzy linear regression model based on fuzzy scalar product
The new concept and method of imposing imprecise (fuzzy) input and output data upon the conventional linear regression model is proposed in this paper. We introduce the fuzzy scala...
Hsien-Chung Wu
TASE
2008
IEEE
14 years 11 months ago
Sensor Selection in Arbitrary Dimensions
We address the sensor selection problem which arises in tracking and localization applications. In sensor selection, the goal is to select a small number of sensors whose measureme...
Volkan Isler, Malik Magdon-Ismail
TASLP
2011
14 years 6 months ago
Advances in Missing Feature Techniques for Robust Large-Vocabulary Continuous Speech Recognition
— Missing feature theory (MFT) has demonstrated great potential for improving the noise robustness in speech recognition. MFT was mostly applied in the log-spectral domain since ...
Maarten Van Segbroeck, Hugo Van Hamme