Sciweavers

271 search results - page 35 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
14 years 1 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
CN
2007
98views more  CN 2007»
13 years 7 months ago
Analysis of point-to-point packet delay in an operational network
— In this paper we perform a detailed analysis of point-to-point packet delay in an operational tier-1 network. The point-to-point delay is the time between a packet entering a r...
Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konsta...
ACMICEC
2005
ACM
121views ECommerce» more  ACMICEC 2005»
14 years 1 months ago
A dynamic Bayesian analysis of the drivers of Internet firm survival
We study the impact of a set of industry, firm- and e-commerce-related factors on Internet firm survival. Through the use of one age-based and another calendar time-based Bayesian...
Sudipto Banerjee, Robert J. Kauffman, Bin Wang
ICMCS
2006
IEEE
150views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Hierarchical Summarization of Videos by Tree-Structured Vector Quantization
Accurate grouping of video shots could lead to semantic indexing of video segments for content analysis and retrieval. This paper introduces a novel cluster analysis which, depend...
Sergio Benini, Aldo Bianchetti, Riccardo Leonardi,...
SAC
2004
ACM
14 years 1 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White