Sciweavers

798 search results - page 109 / 160
» Comparing the expressive power of access control models
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
PAC-Bayesian approach for minimization of phoneme error rate
We describe a new approach for phoneme recognition which aims at minimizing the phoneme error rate. Building on structured prediction techniques, we formulate the phoneme recogniz...
Joseph Keshet, David A. McAllester, Tamir Hazan
WIDM
2004
ACM
14 years 3 months ago
Probabilistic models for focused web crawling
A Focused crawler must use information gleaned from previously crawled page sequences to estimate the relevance of a newly seen URL. Therefore, good performance depends on powerfu...
Hongyu Liu, Evangelos E. Milios, Jeannette Janssen
BMCBI
2008
112views more  BMCBI 2008»
13 years 10 months ago
Normalization for triple-target microarray experiments
Background: Most microarray studies are made using labelling with one or two dyes which allows the hybridization of one or two samples on the same slide. In such experiments, the ...
Marie-Laure Martin-Magniette, Julie Aubert, Avner ...
WSC
1998
13 years 11 months ago
Combining Optimism Limiting Schemes in Time Warp Based Parallel Simulations
The Time Warp protocol is considered to be an effective synchronization mechanism for parallel discrete event simulation (PDES). However, it is widely recognized that it suffers o...
Kevin G. Jones, Samir Ranjan Das
ICSE
2008
IEEE-ACM
14 years 10 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens