Sciweavers

1511 search results - page 177 / 303
» Active Risk Estimation
Sort
View
EUSFLAT
2001
127views Fuzzy Logic» more  EUSFLAT 2001»
13 years 9 months ago
Soft computing in investment appraisal
Standard financial techniques neglect extreme situations and regards large market shifts as too unlikely to matter. Such approach accounts for what occurs most of the time in the ...
Antoaneta Serguieva, John Hunter, Tatiana Kalganov...
WSC
1997
13 years 9 months ago
Object-Oriented Simulation of Paratrooper-Vortex Interactions
The C-17 Airdrop Model provides the Air Force and Army test and evaluation community with the capability to (i) assess the risk of vortex encounters, and (ii) predict ground dispe...
T. Glenn Bailey, Jose C. Belano III, Philip S. Ber...
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 8 months ago
The Projected GSURE for Automatic Parameter Tuning in Iterative Shrinkage Methods
Linear inverse problems are very common in signal and image processing. Many algorithms that aim at solving such problems include unknown parameters that need tuning. In this work...
Raja Giryes, Michael Elad, Yonina C. Eldar
IJRR
2006
183views more  IJRR 2006»
13 years 8 months ago
Bayesian Occupancy Filtering for Multitarget Tracking: An Automotive Application
Reliable and efficient perception and reasoning in dynamic and densely cluttered environments are still major challenges for driver assistance systems. Most of today's system...
Christophe Coué, Cédric Pradalier, C...
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 8 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...