Sciweavers

80 search results - page 10 / 16
» Evaluation of credit risk based on firm performance
Sort
View
ICIAR
2010
Springer
15 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
99
Voted
IJCNN
2006
IEEE
15 years 3 months ago
Semi-Supervised Model Selection Based on Cross-Validation
We propose a new semi-supervised model selection method that is derived by applying the structural risk minimization principle to a recent semi-supervised generalization error bou...
Matti Kaariainen
ESORICS
2011
Springer
13 years 9 months ago
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
The rapid progress of human genome studies leads to a strong demand of aggregate human DNA data (e.g, allele frequencies, test statistics, etc.), whose public dissemination, howeve...
Xiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen...
COLING
2008
14 years 11 months ago
Bayes Risk-based Dialogue Management for Document Retrieval System with Speech Interface
We propose an efficient dialogue management for an information navigation system based on a document knowledge base with a spoken dialogue interface. In order to perform robustly ...
Teruhisa Misu, Tatsuya Kawahara
SENSYS
2010
ACM
14 years 7 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...