Sciweavers

196 search results - page 27 / 40
» Examining risk attitudes
Sort
View
CIKM
2010
Springer
14 years 9 months ago
A unified optimization framework for robust pseudo-relevance feedback algorithms
We present a flexible new optimization framework for finding effective, reliable pseudo-relevance feedback models that unifies existing complementary approaches in a principled wa...
Joshua V. Dillon, Kevyn Collins-Thompson
SYNTHESE
2011
72views more  SYNTHESE 2011»
14 years 6 months ago
Science without (parametric) models: the case of bootstrap resampling
Scientific and statistical inferences build heavily on explicit, parametric models, and often with good reasons. However, the limited scope of parametric models and the increasin...
Jan Sprenger
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
14 years 3 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
COMCOM
2007
100views more  COMCOM 2007»
14 years 11 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
ICST
2009
IEEE
15 years 6 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya