Sciweavers

2006 search results - page 87 / 402
» Heuristic Security-Testing Methods
Sort
View
143
Voted
WWW
2011
ACM
14 years 7 months ago
Domain-independent entity extraction from web search query logs
Query logs of a Web search engine have been increasingly used as a vital source for data mining. This paper presents a study on largescale domain-independent entity extraction fro...
Alpa Jain, Marco Pennacchiotti
JSS
2010
89views more  JSS 2010»
14 years 7 months ago
Verification and validation of declarative model-to-model transformations through invariants
In this paper we propose a method to derive OCL invariants from declarative model-to-model transformations in order to enable their verification and analysis. For this purpose we ...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
92
Voted
TSP
2010
14 years 7 months ago
Channel estimation in wireless OFDM systems with irregular pilot distribution
Abstract--This paper addresses pilot-assisted channel estimation for wireless orthogonal frequency division multiplexing (OFDM) systems with irregular pilot arrangements. Using non...
Peter Fertl, Gerald Matz
ICASSP
2011
IEEE
14 years 4 months ago
Efficient implementation of probabilistic multi-pitch tracking
We significantly improve the computational efficiency of a probabilistic approach for multiple pitch tracking. This method is based on a factorial hidden Markov model and two al...
Michael Wohlmayr, Robert Peharz, Franz Pernkopf
COR
2007
134views more  COR 2007»
15 years 18 days ago
Portfolio selection using neural networks
In this paper we apply a heuristic method based on artificial neural networks (NN) in order to trace out the efficient frontier associated to the portfolio selection problem. We...
Alberto Fernández, Sergio Gómez