Sciweavers

10066 search results - page 1905 / 2014
» A Technique for Information System Integration
Sort
View
CSL
2006
Springer
13 years 9 months ago
Application-independent evaluation of speaker detection
We propose and motivate an alternative to the traditional error-based or cost-based evaluation metrics for the goodness of speaker detection performance. The metric that we propos...
Niko Brümmer, Johan A. du Preez
DATAMINE
2006
117views more  DATAMINE 2006»
13 years 9 months ago
A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...
ENTCS
2006
109views more  ENTCS 2006»
13 years 9 months ago
Incremental Verification for On-the-Fly Controller Synthesis
The CIRCA system automatically synthesizes hard real-time discrete event controllers from plant and environment descriptions. CIRCA's automatically-synthesized controllers pr...
David J. Musliner, Michael J. S. Pelican, Robert P...
IJRR
2008
186views more  IJRR 2008»
13 years 9 months ago
Automated Design of Adaptive Controllers for Modular Robots using Reinforcement Learning
Designing distributed controllers for self-reconfiguring modular robots has been consistently challenging. We have developed a reinforcement learning approach which can be used bo...
Paulina Varshavskaya, Leslie Pack Kaelbling, Danie...
COMSUR
2007
101views more  COMSUR 2007»
13 years 9 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
« Prev « First page 1905 / 2014 Last » Next »