Sciweavers

271 search results - page 35 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
15 years 5 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
CN
2007
98views more  CN 2007»
14 years 11 months ago
Analysis of point-to-point packet delay in an operational network
— In this paper we perform a detailed analysis of point-to-point packet delay in an operational tier-1 network. The point-to-point delay is the time between a packet entering a r...
Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konsta...
ACMICEC
2005
ACM
121views ECommerce» more  ACMICEC 2005»
15 years 5 months ago
A dynamic Bayesian analysis of the drivers of Internet firm survival
We study the impact of a set of industry, firm- and e-commerce-related factors on Internet firm survival. Through the use of one age-based and another calendar time-based Bayesian...
Sudipto Banerjee, Robert J. Kauffman, Bin Wang
ICMCS
2006
IEEE
150views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Hierarchical Summarization of Videos by Tree-Structured Vector Quantization
Accurate grouping of video shots could lead to semantic indexing of video segments for content analysis and retrieval. This paper introduces a novel cluster analysis which, depend...
Sergio Benini, Aldo Bianchetti, Riccardo Leonardi,...
SAC
2004
ACM
15 years 5 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White