Sciweavers

186 search results - page 16 / 38
» Generalized deviations in risk analysis
Sort
View
ICDAR
2009
IEEE
13 years 5 months ago
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model
Hybrid of Neural Network (NN) and Hidden Markov Model (HMM) has been popular in word recognition, taking advantage of NN discriminative property and HMM representational capabilit...
Abdul Rahim Ahmad, Christian Viard-Gaudin, Marzuki...
APSCC
2008
IEEE
14 years 2 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
COMPSAC
2005
IEEE
14 years 1 months ago
An Empirical Performance Study for Validating a Performance Analysis Approach: PSIM
Performance analysis gains more attention in recent years by researchers who focus their study on the early software development stages to mitigate the risk of redesign as problem...
Jinchun Xia, Yujia Ge, Carl K. Chang
JBI
2007
113views Bioinformatics» more  JBI 2007»
13 years 7 months ago
Description of a method to support public health information management: Organizational network analysis
In this case study, we describe a method that has potential to provide systematic support for public health information management. Public health agencies depend on specialized in...
Jacqueline Merrill, Suzanne Bakken, Maxine Rockoff...
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 8 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu