Sciweavers

2043 search results - page 305 / 409
» Reasoning About Security Models
Sort
View
121
Voted
CSL
2006
Springer
15 years 22 days ago
Adaptation of maximum entropy capitalizer: Little data can help a lot
A novel technique for maximum "a posteriori" (MAP) adaptation of maximum entropy (MaxEnt) and maximum entropy Markov models (MEMM) is presented. The technique is applied...
Ciprian Chelba, Alex Acero
109
Voted
CSL
2002
Springer
15 years 15 days ago
Recognition confidence scoring and its use in speech understanding systems
In this paper we present an approach to recognition confidence scoring and a set of techniques for integrating confidence scores into the understanding and dialogue components of ...
Timothy J. Hazen, Stephanie Seneff, Joseph Polifro...
108
Voted
ICWS
2009
IEEE
15 years 10 months ago
Integrating Behavioral Trust in Web Service Compositions
Algorithms for composing Web services (WS) traditionally utilize the functional and quality-of-service parameters of candidate services to decide which services to include in the ...
Sharon Paradesi, Prashant Doshi, Sonu Swaika
98
Voted
SAIG
2001
Springer
15 years 5 months ago
MetaKlaim: Meta-programming for Global Computing
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...
SAFECOMP
2010
Springer
14 years 11 months ago
Reliability Analysis of Safety-Related Communication Architectures
Abstract. In this paper we describe a novel concept for reliability analysis of communication architectures in safety-critical systems. This concept has been motivated by applicati...
Oliver Schulz, Jan Peleska