Sciweavers

496 search results - page 63 / 100
» Where's the (Business) Beef
Sort
View
IEEEARES
2009
IEEE
14 years 5 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
PERCOM
2009
ACM
14 years 5 months ago
Markov Chain Existence and Hidden Markov Models in Spectrum Sensing
—The primary function of a cognitive radio is to detect idle frequencies or sub-bands, not used by the primary users (PUs), and allocate these frequencies to secondary users. The...
Chittabrata Ghosh, Carlos de M. Cordeiro, Dharma P...
EUROMICRO
2009
IEEE
14 years 5 months ago
Using Design Patterns for Refactoring Real-World Models
— Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, ...
Hamed Yaghoubi Shahir, Ehsan Kouroshfar, Raman Ram...
ICASSP
2009
IEEE
14 years 5 months ago
Leveraging multiple query logs to improve language models for spoken query recognition
A voice search system requires a speech interface that can correctly recognize spoken queries uttered by users. The recognition performance strongly relies on a robust language mo...
Xiao Li, Patrick Nguyen, Geoffrey Zweig, Dan Bohus
WECWIS
2009
IEEE
142views ECommerce» more  WECWIS 2009»
14 years 5 months ago
DySCon: Dynamic Sharing Control for Distributed Team Collaboration in Networked Enterprises
– Networked enterprises create virtual teams of distributed experts belonging to different enterprises where one user can be part of multiple teams; How to effectively control th...
Ahmad Kamran Malik, Hong Linh Truong, Schahram Dus...