Sciweavers

2728 search results - page 530 / 546
» Ideologies and Their Points of View
Sort
View
94
Voted
IOR
2008
126views more  IOR 2008»
14 years 11 months ago
Fast Simulation of Multifactor Portfolio Credit Risk
This paper develops rare event simulation methods for the estimation of portfolio credit risk -- the risk of losses to a portfolio resulting from defaults of assets in the portfol...
Paul Glasserman, Wanmo Kang, Perwez Shahabuddin
COMPUTER
2007
93views more  COMPUTER 2007»
14 years 11 months ago
The Computing Profession and Higher Education
not things, but abstractions that represent things. Data use provides human civilization’s foundation, and computers and other digital technologies have merely amplified this us...
W. Neville Holmes
IJNSEC
2006
200views more  IJNSEC 2006»
14 years 11 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
JACM
2006
99views more  JACM 2006»
14 years 11 months ago
Finding a maximum likelihood tree is hard
Abstract. Maximum likelihood (ML) is an increasingly popular optimality criterion for selecting evolutionary trees [Felsenstein 1981]. Finding optimal ML trees appears to be a very...
Benny Chor, Tamir Tuller
JOT
2008
72views more  JOT 2008»
14 years 11 months ago
Fixing Apples' Broken Clipboard, with Java
The Mac OS X clipboard is infamous for changing the format of bit-mapped images that are pasted to it. These images are typically encoded using a QuickTime Tiff compressor that re...
Douglas A. Lyon