Sciweavers

341 search results - page 38 / 69
» Maturity-independent risk measures
Sort
View
HASE
2008
IEEE
13 years 10 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
CN
2010
149views more  CN 2010»
13 years 9 months ago
An automatic HTTP cookie management system
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
COMPUTER
2004
80views more  COMPUTER 2004»
13 years 8 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
JMLR
2002
90views more  JMLR 2002»
13 years 8 months ago
Machine Learning with Data Dependent Hypothesis Classes
We extend the VC theory of statistical learning to data dependent spaces of classifiers. This theory can be viewed as a decomposition of classifier design into two components; the...
Adam Cannon, J. Mark Ettinger, Don R. Hush, Clint ...
ICASSP
2011
IEEE
13 years 17 days ago
Recent development of discriminative training using non-uniform criteria for cross-level acoustic modeling
In this paper, we extend our previous study on discriminative training using non-uniform criteria for speech recognition. The work will put emphasis on how the acoustic modeling i...
Chao Weng, Biing-Hwang Juang