Sciweavers

691 search results - page 93 / 139
» Design comparisons for procurement systems
Sort
View
SICHERHEIT
2010
13 years 8 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
ICASSP
2011
IEEE
13 years 1 months ago
Open-set speaker identification in broadcast news
In this paper, we examine the problem of text-independent open-set speaker identification (OS-SI) in broadcast news. Particularly, the impact of the population of registered speak...
Chao Gao, Guruprasad Saikumar, Amit Srivastava, Pr...
ACL
2012
12 years 13 days ago
PORT: a Precision-Order-Recall MT Evaluation Metric for Tuning
Many machine translation (MT) evaluation metrics have been shown to correlate better with human judgment than BLEU. In principle, tuning on these metrics should yield better syste...
Boxing Chen, Roland Kuhn, Samuel Larkin
SCESM
2006
ACM
247views Algorithms» more  SCESM 2006»
14 years 4 months ago
Automating software architecture exploration with M2Aspects
An important step in the development of large-scale distributed reactive systems is the design of effective system architectures. The early availability of prototypes facilitates...
Ingolf H. Krüger, Gunny Lee, Michael Meisinge...
BMCBI
2005
87views more  BMCBI 2005»
13 years 10 months ago
BioCreAtIvE Task 1A: gene mention finding evaluation
Background: The biological research literature is a major repository of knowledge. As the amount of literature increases, it will get harder to find the information of interest on...
Alexander S. Yeh, Alexander A. Morgan, Marc E. Col...