Sciweavers

95 search results - page 16 / 19
» Risk assessment in distributed authorization
Sort
View
90
Voted
AAAI
2011
13 years 9 months ago
Modeling and Monitoring Crop Disease in Developing Countries
Information about the spread of crop disease is vital in developing countries, and as a result the governments of such countries devote scarce resources to gathering such data. Un...
John Alexander Quinn, Kevin Leyton-Brown, Ernest M...
ECCV
2004
Springer
15 years 1 months ago
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification Devices
Abstract. Assessing the matching error rates of a biometric identification devices is integral to understanding its performance. Here we propose and evaluate several methods for cr...
Travis J. Atkinson, Michael E. Schuckers
CSDA
2006
109views more  CSDA 2006»
14 years 9 months ago
Possibility theory and statistical reasoning
Numerical possibility distributions can encode special convex families of probability measures. The connection between possibility theory and probability theory is potentially fru...
Didier Dubois
STOC
2012
ACM
251views Algorithms» more  STOC 2012»
13 years 2 days ago
Minimax option pricing meets black-scholes in the limit
Option contracts are a type of financial derivative that allow investors to hedge risk and speculate on the variation of an asset’s future market price. In short, an option has...
Jacob Abernethy, Rafael M. Frongillo, Andre Wibiso...
68
Voted
CHI
2008
ACM
15 years 10 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi