Sciweavers

672 search results - page 83 / 135
» Words and forbidden factors
Sort
View
KES
2007
Springer
14 years 2 months ago
Credal Networks for Operational Risk Measurement and Management
According to widely accepted guidelines for self-regulation, the capital requirements of a bank should relate to the level of risk with respect to three different categories. Amon...
Alessandro Antonucci, Alberto Piatti, Marco Zaffal...
MLMI
2007
Springer
14 years 2 months ago
Towards an Objective Test for Meeting Browsers: The BET4TQB Pilot Experiment
This paper outlines first the BET method for task-based evaluation of meeting browsers. ‘Observations of interest’ in meetings are empirically determined by neutral observers ...
Andrei Popescu-Belis, Philippe Baudrion, Mike Flyn...
PKC
2007
Springer
125views Cryptology» more  PKC 2007»
14 years 2 months ago
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
Damg˚ard et al. [11] showed a novel technique to convert a polynomial sharing of secret a into the sharings of the bits of a in constant rounds, which is called the bit-decomposit...
Takashi Nishide, Kazuo Ohta
IUI
2006
ACM
14 years 2 months ago
Three phase verification for spoken dialog clarification
Spoken dialog tasks incur many errors including speech recognition errors, understanding errors, and even dialog management errors. These errors create a big gap between user'...
Sangkeun Jung, Cheongjae Lee, Gary Geunbae Lee
DSN
2005
IEEE
14 years 2 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...