Sciweavers

2701 search results - page 427 / 541
» Evaluation Issues
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 2 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
EMNLP
2009
15 years 2 months ago
Mining Search Engine Clickthrough Log for Matching N-gram Features
User clicks on a URL in response to a query are extremely useful predictors of the URL's relevance to that query. Exact match click features tend to suffer from severe data s...
Huihsin Tseng, Longbin Chen, Fan Li, Ziming Zhuang...
EUSFLAT
2009
124views Fuzzy Logic» more  EUSFLAT 2009»
15 years 2 months ago
A toward Framework for Generic Uncertainty Management
The need for an automatic inference process able to deal with information coming from unreliable sources is becoming a relevant issue both on corporate networks and on the open Web...
Ernesto Damiani, Paolo Ceravolo, Marcello Leida
166
Voted
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 2 months ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...
ICDAR
2009
IEEE
15 years 2 months ago
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model
Hybrid of Neural Network (NN) and Hidden Markov Model (HMM) has been popular in word recognition, taking advantage of NN discriminative property and HMM representational capabilit...
Abdul Rahim Ahmad, Christian Viard-Gaudin, Marzuki...