Sciweavers

126
Voted
IMCSIT
2010
15 years 22 days ago
Efficient Portfolio Optimization with Conditional Value at Risk
The portfolio optimization problem is modeled as a mean-risk bicriteria optimization problem where the expected return is maximized and some (scalar) risk measure is minimized. In ...
Wlodzimierz Ogryczak, Tomasz Sliwinski
100
Voted
IMCSIT
2010
15 years 22 days ago
Tools for syntactic concordancing
Concordancers are tools that display the immediate context for the occurrences of a given word in a corpus. Also called KWIC
Violeta Seretan, Eric Wehrli
124
Voted
IMCSIT
2010
15 years 22 days ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier
141
Voted
IMCSIT
2010
15 years 22 days ago
An Hypergraph Object Oriented Model for Image Segmentation and Annotation
This paper presents a system for segmentation of images into regions and annotation of these regions for semantic identification of the objects present in the image. The unified me...
Eugen Ganea, Marius Brezovan
109
Voted
IMCSIT
2010
15 years 22 days ago
Assembling Recursively Stored Sparse Matrices
Abstract--Recently, we have introduced an approach to multicore computations on sparse matrices using recursive partitioning, called Recursive Sparse Blocks (RSB). In this document...
Michele Martone, Salvatore Filippone, Marcin Paprz...
129
Voted
IMCSIT
2010
15 years 22 days ago
German subordinate clause word order in dialogue-based CALL.
We present a dialogue system for exercising the German subordinate clause word order. The pedagogical methodology we adopt is based on focused tasks: the targeted linguistic struct...
Magdalena Wolska, Sabrina Wilske
87
Voted
IMCSIT
2010
15 years 22 days ago
Undetectable Spread-time Stegosystem Based on Noisy Channels
We consider a scenario where an attacker is able to receive a stegosignal only over a Gaussian channel. But in order to provide security of this channel noise
Valery I. Korzhik, Guillermo Morales-Luna, Ksenia ...
121
Voted
IMCSIT
2010
15 years 22 days ago
BeesyBees - Efficient and Reliable Execution of Service-based Workflow Applications for BeesyCluster using Distributed Agents
Abstract--The paper presents an architecture and implementation that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middlewar...
Pawel Czarnul, Mariusz R. Matuszek, Michal W&oacut...
IMCSIT
2010
15 years 22 days ago
Building and Using Existing Hunspell Dictionaries and TeX Hyphenators as Finite-State Automata
Abstract--There are numerous formats for writing spellcheckers for open-source systems and there are many descriptions for languages written in these formats. Similarly, for word h...
Tommi Pirinen, Krister Lindén