Sciweavers

6583 search results - page 976 / 1317
» Semantic Analysis Patterns
Sort
View
173
Voted
TSMC
2008
133views more  TSMC 2008»
15 years 4 months ago
Trading With a Stock Chart Heuristic
Abstract--The efficient market hypothesis (EMH) is a cornerstone of financial economics. The EMH asserts that security prices fully reflect all available information and that the s...
William Leigh, Cheryl J. Frohlich, Steven Hornik, ...
RAID
2010
Springer
15 years 3 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
174
Voted
MASS
2010
133views Communications» more  MASS 2010»
15 years 2 months ago
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure
Abstract--Spread spectrum techniques (e.g., Frequency Hopping (FH), Direct Sequence Spread Spectrum (DSSS)) have been widely used for anti-jamming wireless communications. Such tec...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu
PRL
2010
149views more  PRL 2010»
14 years 11 months ago
Adaptive linear models for regression: Improving prediction when population has changed
The general setting of regression analysis is to identify a relationship between a response variable Y and one or several explanatory variables X by using a learning sample. In a ...
Charles Bouveyron, Julien Jacques
WWW
2004
ACM
16 years 5 months ago
Incremental formalization of document annotations through ontology-based paraphrasing
For the manual semantic markup of documents to become widespread, users must be able to express annotations that conform to ontologies (or schemas) that have shared meaning. Howev...
Jim Blythe, Yolanda Gil