Sciweavers

10055 search results - page 1835 / 2011
» Structured programming using processes
Sort
View
BIS
2009
112views Business» more  BIS 2009»
13 years 7 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
CGF
2010
168views more  CGF 2010»
13 years 6 months ago
How to Write a Visualization Research Paper: A Starting Point
This paper attempts to explain the mechanics of writing a research paper in visualization. This serves as a useful starting point for those who have never written a research paper...
Robert S. Laramee
ENTCS
2011
99views more  ENTCS 2011»
13 years 4 months ago
Symmetry and Composition in Probabilistic Theories
The past decade has seen a remarkable resurgence of the old programme of finding more or less a priori axioms for the mathematical framework of quantum mechanics. The new impetus...
Alexander Wilce
EWC
2011
52views more  EWC 2011»
13 years 4 months ago
Localized coarsening of conforming all-hexahedral meshes
Abstract. Finite element mesh adaptation methods can be used to improve the efficiency and accuracy of solutions to computational modeling problems. In many applications involving ...
Adam C. Woodbury, Jason F. Shepherd, Matthew L. St...
TASLP
2011
13 years 4 months ago
Advances in Missing Feature Techniques for Robust Large-Vocabulary Continuous Speech Recognition
— Missing feature theory (MFT) has demonstrated great potential for improving the noise robustness in speech recognition. MFT was mostly applied in the log-spectral domain since ...
Maarten Van Segbroeck, Hugo Van Hamme
« Prev « First page 1835 / 2011 Last » Next »