Sciweavers

7049 search results - page 1379 / 1410
» Data Abstraction for CSP-OZ
Sort
View
ISF
2006
118views more  ISF 2006»
13 years 8 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
JISE
2008
77views more  JISE 2008»
13 years 8 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
JOT
2008
100views more  JOT 2008»
13 years 8 months ago
Panda: a Pattern-based Programming System for Automatic Code Generation
This article provides an overview of a pattern-based programming system, named Panda, for automatic generation of high-level programming language code. Many code generation system...
Daniele Mazzeranghi
JCP
2006
90views more  JCP 2006»
13 years 8 months ago
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network
Abstract-- Mobile location estimation is becoming an important value-added service for a mobile phone operator. It is well-known that GPS can provide an accurate location estimatio...
Junyang Zhou, Joseph Kee-Yin Ng
JCST
2006
99views more  JCST 2006»
13 years 8 months ago
A Dialectal Chinese Speech Recognition Framework
Abstract A framework for dialectal Chinese speech recognition is proposed and studied, in which a relatively small dialectal Chinese (or in other words Chinese influenced by the na...
Jing Li, Thomas Zheng, William Byrne, Daniel Juraf...
« Prev « First page 1379 / 1410 Last » Next »