Sciweavers

2956 search results - page 493 / 592
» Targeted Data Prefetching
Sort
View
99
Voted
IEEESP
2010
99views more  IEEESP 2010»
15 years 1 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
107
Voted
JOCN
2010
88views more  JOCN 2010»
15 years 1 months ago
Imaging Implicit Morphological Processing: Evidence from Hebrew
■ Is morphology a discrete and independent element of lexical structure or does it simply reflect a fine-tuning of the system to the statistical correlation that exists among or...
Atira S. Bick, Ram Frost, Gadi Goelman
153
Voted
NN
2010
Springer
225views Neural Networks» more  NN 2010»
15 years 1 months ago
Learning to imitate stochastic time series in a compositional way by chaos
This study shows that a mixture of RNN experts model can acquire the ability to generate sequences that are combination of multiple primitive patterns by means of self-organizing ...
Jun Namikawa, Jun Tani
PVLDB
2010
158views more  PVLDB 2010»
15 years 1 months ago
Building Ranked Mashups of Unstructured Sources with Uncertain Information
Mashups are situational applications that join multiple sources to better meet the information needs of Web users. Web sources can be huge databases behind query interfaces, which...
Mohamed A. Soliman, Ihab F. Ilyas, Mina Saleeb
124
Voted
TIP
2010
150views more  TIP 2010»
15 years 1 months ago
Study of Subjective and Objective Quality Assessment of Video
Abstract—We present the results of a recent large-scale subjective study of video quality on a collection of videos distorted by a variety of application-relevant processes. Meth...
Kalpana Seshadrinathan, Rajiv Soundararajan, Alan ...