Sciweavers

3104 search results - page 256 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
LREC
2010
127views Education» more  LREC 2010»
15 years 6 months ago
Evaluation of the PIT Corpus Or What a Difference a Face Makes?
This paper presents the evaluation of the PIT Corpus of multi-party dialogues recorded in a Wizard-of-Oz environment. An evaluation has been performed with two different foci: Fir...
Petra-Maria Strauß, Stefan Scherer, Georg La...
DAC
2005
ACM
16 years 5 months ago
Approximate VCCs: a new characterization of multimedia workloads for system-level MpSoC design
System-level design methods specifically targeted towards multimedia applications have recently received a lot of attention. Multimedia workloads are known to have a high degree o...
Yanhong Liu, Samarjit Chakraborty, Wei Tsang Ooi
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 10 months ago
Financial Model-Base Construction for Flexible Model Manipulation of Models and Solvers
As financial markets are volatile and rapidly changing, preciseness and agility in price evaluation and risk assessment in the portfolios are more important and decision support s...
Keun-Woo Lee, Soon-Young Huh
SICHERHEIT
2010
15 years 2 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
ECSCW
2007
15 years 6 months ago
Social bookmarking and exploratory search
In this paper, we explore various search tasks that are supported by a social bookmarking service. These bookmarking services hold great potential to powerfully combine personal ta...
David R. Millen, Meng Yang, Steven Whittaker, Jona...