DE eng

Search in the Catalogues and Directories

Page: 1 2 3
Hits 1 – 20 of 43

1
Toward Determining the Comprehensibility of Machine Translations
In: DTIC (2012)
BASE
Show details
2
Regression in Analysis
In: DTIC (2008)
BASE
Show details
3
The British Sign Language (BSL) norms for age of acquisition, familiarity, and iconicity
In: BEHAV RES METHODS , 40 (4) 1079 - 1087. (2008) (2008)
BASE
Show details
4
Experimental Facility for Measuring the Impact of Environmental Noise and Speaker Variation on Speech-to-Speech Translation Devices
In: DTIC (2006)
BASE
Show details
5
More than words: a common neural basis for reading and naming deficits in developmental dyslexia?
In: BRAIN , 128 261 - 267. (2005) (2005)
BASE
Show details
6
Final Approach Trajectory Control with Fuzzy Controller.
In: DTIC AND NTIS (1999)
BASE
Show details
7
A Statistical, Nonparametric Methodology for Document Degradation Model Validation
In: DTIC (1999)
BASE
Show details
8
Fuzzy Controller for Acoustic Vehicle Target Intercept Guidance
In: DTIC AND NTIS (1997)
BASE
Show details
9
Fuzzy Controller for Beam Rider Guidance.
In: DTIC AND NTIS (1995)
BASE
Show details
10
A Self-Organizing Neural Network Architecture for Auditory and Speech Perception with Applications to Acoustic and Other Temporal Prediction Problems
In: DTIC AND NTIS (1994)
BASE
Show details
11
Coherence and Usability of an Environmental Impact Statement
In: DTIC AND NTIS (1994)
BASE
Show details
12
Vulnerability Assessment Using a Fuzzy Logic Based Method
In: DTIC AND NTIS (1993)
Abstract: This thesis demonstrates the feasibility of using qualitative analysis methods to evaluate computer security vulnerabilities. Although many risk analysis systems exist, few provide for the adequate analysis of identified vulnerabilities. While the main focus of this thesis is to evaluate computer security vulnerabilities, the methods involved have application in other areas requiring evaluation using qualitative methods. It is proposed, and demonstrated by this thesis, that the use of qualitative analysis using linguistic variables to describe the impact of computer security vulnerabilities is not only feasible, but intrinsically easier to understand and use than quantitative methods.
Keyword: *DATA PROCESSING SECURITY; *QUALITATIVE ANALYSIS; *VULNERABILITY; ARTIFICIAL INTELLIGENCE; Computer Systems Management and Standards; COMPUTERS; FEASIBILITY STUDIES; FUZZY LOGIC; IMPACT; LINGUISTICS; RISK; THESES; VARIABLES
URL: http://oai.dtic.mil/oai/oai?&verb=getRecord&metadataPrefix=html&identifier=ADA274075
http://www.dtic.mil/docs/citations/ADA274075
BASE
Hide details
13
New Results on the Compatibility of the Standard Conditional Likelihood Approach with Product Space Conditional Event Algebra
In: DTIC AND NTIS (1992)
BASE
Show details
14
The Role of Conditional Event Algebra in the Modeling of C3 Systems
In: DTIC AND NTIS (1992)
BASE
Show details
15
Word and Subword Modelling in a Segment-Based HMM Word Spotter Using a Data Analytic Approach
In: DTIC AND NTIS (1992)
BASE
Show details
16
Segment-Based Acoustic Models for Continuous Speech Recognition
In: DTIC AND NTIS (1992)
BASE
Show details
17
Rule Based Sinusoidal Encoding of Speech
In: DTIC AND NTIS (1990)
BASE
Show details
18
The Effect of Three Variables on Synthetic Speech Intelligibility in Noisy Environments
In: DTIC AND NTIS (1990)
BASE
Show details
19
Knowledge and Ability Factors Underlying Simple Learning by Accretion
In: DTIC AND NTIS (1989)
BASE
Show details
20
Knowledge and Processing Speed as Determinants of Associative Learning
In: DTIC AND NTIS (1989)
BASE
Show details

Page: 1 2 3

Catalogues
0
0
0
0
0
0
0
Bibliographies
0
0
0
0
0
0
0
0
0
Linked Open Data catalogues
0
Online resources
0
0
0
0
Open access documents
43
0
0
0
0
© 2013 - 2024 Lin|gu|is|tik | Imprint | Privacy Policy | Datenschutzeinstellungen ändern