Sciweavers

6926 search results - page 38 / 1386
» A More Effective CEFF
Sort
View
AAAI
1994
13 years 10 months ago
Cost-Effective Sensing during Plan Execution
Between sensing the world after every action (as in a reactive plan) and not sensing at all (as in an openloop plan), lies a continuum of strategies for sensing during plan execut...
Eric A. Hansen
ACL
1989
13 years 10 months ago
The Effects of Interaction on Spoken Discourse
Near-term spoken language systems willlikely be limited in their interactive capabilities. To design them, we shall need to model how the presence or absence of speaker interactio...
Sharon L. Oviatt, Philip R. Cohen
COMCOM
2006
75views more  COMCOM 2006»
13 years 9 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
JCP
2008
145views more  JCP 2008»
13 years 9 months ago
An Effective Mining Algorithm for Weighted Association Rules in Communication Networks
The mining of weighted association rules is one of the primary methods used in communication alarm correlation analysis. With large communication alarm database, the traditional me...
Jian Wu, Xing ming Li
TSE
2008
111views more  TSE 2008»
13 years 9 months ago
Effective Software Merging in the Presence of Object-Oriented Refactorings
Current text based Software Configuration Management (SCM) systems have trouble with refactorings. Refactorings result in global changes which lead to merge conflicts. A refactorin...
Danny Dig, Kashif Manzoor, Ralph E. Johnson, Tien ...