Sciweavers

816 search results - page 48 / 164
» Practical Multi-level Modeling on MOF-compliant Modeling Fra...
Sort
View
IFIP
2007
Springer
15 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
FTSIG
2007
136views more  FTSIG 2007»
14 years 9 months ago
The Application of Hidden Markov Models in Speech Recognition
Hidden Markov Models (HMMs) provide a simple and effective framework for modelling time-varying spectral vector sequences. As a consequence, almost all present day large vocabula...
Mark J. F. Gales, Steve Young
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 4 months ago
Validation Measures in CMMI
—Validation is one of the software engineering disciplines that help build quality into software. The major objective of software validation process is to determine that the soft...
Mahmoud Khraiwesh
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 4 months ago
A Model of Antecedents of RFID Adoption Intention in the Supply Chain
The application of the Radio Frequency Identification (RFID) technology in the supply chain has experienced increased attention in academic research and practice. There is, howeve...
Maria Madlberger
ICASSP
2008
IEEE
15 years 4 months ago
Corrected tandem features for acoustic model training
This paper describes a simple method for significantly improving Tandem features used to train acoustic models for large-vocabulary speech recognition. The linear activations at ...
Arlo Faria, Nelson Morgan