Sciweavers

420 search results - page 35 / 84
» Examining the Relationships between Performance Requirements...
Sort
View
ISSA
2004
13 years 9 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 8 months ago
Social interaction in particle swarm optimization, the ranked FIPS, and adaptive multi-swarms
The interaction among particles is a vital aspect of Particle Swarm Optimization. As such, it has a strong influence on the swarm’s success. In this study various approaches re...
Johannes Jordan, Sabine Helwig, Rolf Wanka
ICASSP
2010
IEEE
13 years 8 months ago
Empirical Type-i filter design for image interpolation
Empirical filter designs generalize relationships inferred from training data to effect realistic solutions that conform well to the human visual system. Complex algorithms invol...
Karl S. Ni, Truong Q. Nguyen
SPEECH
2008
79views more  SPEECH 2008»
13 years 7 months ago
Adapting speaking after evidence of misrecognition: Local and global hyperarticulation
In this paper we examine the two-way relationship between hyperarticulation and evidence of misrecognition of computer-directed speech. We report the results of an experiment in w...
Amanda Stent, Marie K. Huffman, Susan E. Brennan
COMCOM
2010
95views more  COMCOM 2010»
13 years 6 months ago
Trading link utilization for queueing delays: An adaptive approach
Understanding the relationship between queueing delays and link utilization for general traffic conditions is an important open problem in networking research. Difficulties in und...
Rade Stanojevic, Robert Shorten