Sciweavers

951 search results - page 138 / 191
» Suggestions for OWL 3
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
14 years 9 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
CACM
2011
96views more  CACM 2011»
14 years 6 months ago
Why STM can be more than a research toy
Software Transactional Memory (STM) promises to simplify concurrent programming without requiring specific hardware support. Yet, STM’s credibility lies on the extent to which ...
Aleksandar Dragojevic, Pascal Felber, Vincent Gram...
IHI
2010
106views Healthcare» more  IHI 2010»
14 years 6 months ago
Identifying opportunities for inpatient-centric technology
The evolution from a disease-centered model of care to a more patient-centered model presents opportunities for going beyond designing technology to support medical professionals ...
Meredith M. Skeels, Desney S. Tan
INTERSPEECH
2010
14 years 6 months ago
The relevance of timing, pauses and overlaps in dialogues: detecting topic changes in scenario based meetings
We present an investigation of the relevance of simple conversational features as indicators of topic shifts in small-group meetings. Three proposals for representation of dialogu...
Saturnino Luz, Jing Su
INTERSPEECH
2010
14 years 6 months ago
On speaker adaptive training of artificial neural networks
In the paper we present two techniques improving the recognition accuracy of multilayer perceptron neural networks (MLP ANN) by means of adopting Speaker Adaptive Training. The us...
Jan Trmal, Jan Zelinka, Ludek Müller