Sciweavers

3000 search results - page 529 / 600
» Accessing an Information System by Chatting
Sort
View
DBSEC
2010
161views Database» more  DBSEC 2010»
13 years 10 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
LREC
2010
155views Education» more  LREC 2010»
13 years 10 months ago
Multimodal Russian Corpus (MURCO): First Steps
The paper introduces the Multimodal Russian Corpus (MURCO), which has been created in the framework of the Russian National Corpus (RNC). The MURCO provides the users with the gre...
Elena Grishina
ICMLA
2007
13 years 10 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an ofï¬...
Guillaume Bouchard, Jean-Marc Andreoli
LWA
2008
13 years 10 months ago
Labeling Clusters - Tagging Resources
In order to support the navigation in huge document collections efficiently, tagged hierarchical structures can be used. Often, multiple tags are used to describe resources. For u...
Korinna Bade, Andreas Nürnberger
NETWORKING
2008
13 years 10 months ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...