Sciweavers

2006 search results - page 87 / 402
» Heuristic Security-Testing Methods
Sort
View
WWW
2011
ACM
14 years 9 months ago
Domain-independent entity extraction from web search query logs
Query logs of a Web search engine have been increasingly used as a vital source for data mining. This paper presents a study on largescale domain-independent entity extraction fro...
Alpa Jain, Marco Pennacchiotti
JSS
2010
89views more  JSS 2010»
14 years 9 months ago
Verification and validation of declarative model-to-model transformations through invariants
In this paper we propose a method to derive OCL invariants from declarative model-to-model transformations in order to enable their verification and analysis. For this purpose we ...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
109
Voted
TSP
2010
14 years 9 months ago
Channel estimation in wireless OFDM systems with irregular pilot distribution
Abstract--This paper addresses pilot-assisted channel estimation for wireless orthogonal frequency division multiplexing (OFDM) systems with irregular pilot arrangements. Using non...
Peter Fertl, Gerald Matz
ICASSP
2011
IEEE
14 years 6 months ago
Efficient implementation of probabilistic multi-pitch tracking
We significantly improve the computational efficiency of a probabilistic approach for multiple pitch tracking. This method is based on a factorial hidden Markov model and two al...
Michael Wohlmayr, Robert Peharz, Franz Pernkopf
130
Voted
COR
2007
134views more  COR 2007»
15 years 2 months ago
Portfolio selection using neural networks
In this paper we apply a heuristic method based on artificial neural networks (NN) in order to trace out the efficient frontier associated to the portfolio selection problem. We...
Alberto Fernández, Sergio Gómez