Sciweavers

1548 search results - page 201 / 310
» Estimating Software Vulnerabilities
Sort
View
IIE
2006
183views more  IIE 2006»
14 years 11 months ago
Desktop Tools for Offline Plagiarism Detection in Computer Programs
Plagiarism in universities has always been a difficult problem to overcome. Various tools have been developed over the past few years to help teachers detect plagiarism in students...
Maxim Mozgovoy
CMPB
2008
63views more  CMPB 2008»
14 years 10 months ago
SAS and R functions to compute pseudo-values for censored data regression
Recently, in a series of papers, a method based on pseudo-values has been proposed for direct regression modeling of the survival function, the restricted mean and cumulative inci...
John P. Klein, Mette Gerster, Per Kragh Andersen, ...
TASLP
2010
130views more  TASLP 2010»
14 years 6 months ago
A Non-Intrusive Quality and Intelligibility Measure of Reverberant and Dereverberated Speech
A modulation spectral representation is investigated for non-intrusive quality and intelligibility measurement of reverberant and dereverberated speech. The representation is obtai...
Tiago H. Falk, Chenxi Zheng, Wai-Yip Chan
TASLP
2010
159views more  TASLP 2010»
14 years 6 months ago
Under-Determined Reverberant Audio Source Separation Using a Full-Rank Spatial Covariance Model
This article addresses the modeling of reverberant recording environments in the context of under-determined convolutive blind source separation. We model the contribution of each ...
Ngoc Q. K. Duong, Emmanuel Vincent, Rémi Gr...
BPM
2011
Springer
271views Business» more  BPM 2011»
13 years 11 months ago
Stimulating Skill Evolution in Market-Based Crowdsourcing
Abstract. Crowdsourcing has emerged as an important paradigm in human problem-solving techniques on the Web. One application of crowdsourcing is to outsource certain tasks to the c...
Benjamin Satzger, Harald Psaier, Daniel Schall, Sc...