Sciweavers

5475 search results - page 1074 / 1095
» Model Driven Security
Sort
View
96
Voted
FSS
2002
84views more  FSS 2002»
15 years 7 days ago
A possibilistic approach to selecting portfolios with highest utility score
The mean-variance methodology for the portfolio selection problem, originally proposed by Markowitz, has been one of the most important research fields in modern finance. In this ...
Christer Carlsson, Robert Fullér, Pé...
INTERNET
2010
119views more  INTERNET 2010»
14 years 11 months ago
A Chat Application in Lift
s the HTTP request–response cycle rather than wrapping HTTP concepts in APIs. This means you put HTML element definition and action in the same place: var name = "" SHt...
David Pollak, Steve Vinoski
102
Voted
JSAC
2010
107views more  JSAC 2010»
14 years 11 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
PPDP
2010
Springer
14 years 10 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch
103
Voted
SPEECH
2010
89views more  SPEECH 2010»
14 years 7 months ago
Which words are hard to recognize? Prosodic, lexical, and disfluency factors that increase speech recognition error rates
Despite years of speech recognition research, little is known about which words tend to be misrecognized and why. Previous work has shown that errors increase for infrequent words...
Sharon Goldwater, Daniel Jurafsky, Christopher D. ...
« Prev « First page 1074 / 1095 Last » Next »