Sciweavers

1627 search results - page 269 / 326
» On context in authorization policy
Sort
View
JORS
2010
134views more  JORS 2010»
13 years 3 months ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...
PR
2010
135views more  PR 2010»
13 years 3 months ago
Revisiting priority queues for image analysis
Many algorithms in image analysis require a priority queue, a data structure that holds pointers to pixels in the image, and which allows efficiently finding the pixel in the queu...
Cris L. Luengo Hendriks
ICASSP
2011
IEEE
13 years 17 days ago
A simplified Subspace Gaussian Mixture to compact acoustic models for speech recognition
Speech recognition applications are known to require a significant amount of resources (memory, computing power). However, embedded speech recognition systems, such as in mobile p...
Mohamed Bouallegue, Driss Matrouf, Georges Linares
CHI
2011
ACM
13 years 12 days ago
Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight
This is a critical design paper offering a possible scenario of use intended to provoke reflection about values and politics of design in persuasive computing. We describe the des...
Stephen Purpura, Victoria Schwanda, Kaiton William...
CHI
2011
ACM
13 years 12 days ago
MonoTrans2: a new human computation system to support monolingual translation
In this paper, we present MonoTrans2, a new user interface to support monolingual translation; that is, translation by people who speak only the source or target language, but not...
Chang Hu, Benjamin B. Bederson, Philip Resnik, Yak...