Sciweavers

14379 search results - page 2869 / 2876
» is 2000
Sort
View
113
Voted
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 8 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
AUTOMATICA
2010
111views more  AUTOMATICA 2010»
14 years 7 months ago
Connection between cooperative positive systems and integral input-to-state stability of large-scale systems
We consider a class of continuous-time cooperative systems evolving on the positive orthant Rn +. We show that if the origin is globally attractive, then it is also globally stabl...
Björn Rüffer, Christopher M. Kellett, St...
IJMTM
2010
137views more  IJMTM 2010»
14 years 7 months ago
Entry-level engineering professionals and Product Lifecycle Management: a competency model
: In today's rapidly evolving global marketplace, jobs are continually being redefined due to technological innovations and a host of other factors. Workers are also being cal...
Sharron A. Frillman, Kari L. Wilde, Jonathan F. Ko...
BMCBI
2011
14 years 5 months ago
CNV-WebStore: Online CNV Analysis, Storage and Interpretation
Background: Microarray technology allows the analysis of genomic aberrations at an ever increasing resolution, making functional interpretation of these vast amounts of data the m...
Geert Vandeweyer, Edwin Reyniers, Wim Wuyts, Liesb...
COLING
2010
14 years 5 months ago
Unsupervised Discriminative Language Model Training for Machine Translation using Simulated Confusion Sets
An unsupervised discriminative training procedure is proposed for estimating a language model (LM) for machine translation (MT). An English-to-English synchronous context-free gra...
Zhifei Li, Ziyuan Wang, Sanjeev Khudanpur, Jason E...
« Prev « First page 2869 / 2876 Last » Next »