Sciweavers

113 search results - page 16 / 23
» Requirements-Related Risks in Critical Systems
Sort
View
HICSS
2009
IEEE
147views Biometrics» more  HICSS 2009»
14 years 2 months ago
Determining a Firm's Optimal Outsourcing Rate: A Learning Model Perspective
We present a decision model of a firm’s optimal outsourcing rate as an extension of Cha et. al [1]’s previous work on the economic risk of knowledge loss and deskilling in the...
Hoon S. Cha, David E. Pingry, Matt E. Thatcher
ACL
2001
13 years 9 months ago
Fast Decoding and Optimal Decoding for Machine Translation
A good decoding algorithm is critical to the success of any statistical machine translation system. The decoder's job is to find the translation that is most likely according...
Ulrich Germann, Michael Jahr, Kevin Knight, Daniel...
DATAMINE
1999
81views more  DATAMINE 1999»
13 years 7 months ago
The Role of Occam's Razor in Knowledge Discovery
Many KDD systems incorporate an implicit or explicit preference for simpler models, but this use of "Occam's razor" has been strongly criticized by several authors (...
Pedro Domingos
ACSAC
2000
IEEE
14 years 1 days ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
ICICS
2003
Springer
14 years 25 days ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...