Sciweavers

45 search results - page 6 / 9
» Accessing speech data using strategic fixation
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
ADHOC
2008
132views more  ADHOC 2008»
13 years 7 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
ICDM
2007
IEEE
186views Data Mining» more  ICDM 2007»
14 years 1 months ago
Mining Interpretable Human Strategies: A Case Study
This paper focuses on mining human strategies by observing their actions. Our application domain is an HCI study aimed at discovering general strategies used by software users and...
Xiaoli Z. Fern, Chaitanya Komireddy, Margaret M. B...
BXML
2004
13 years 8 months ago
Telephony Interface of the ExtraPlanT Multi-agent Production Planning System
: ExtraPlanT system is a multi-agent production planning system designed for small factories, which needs to react quickly on market changes. To deal with this requirement, ExtraPl...
Petr Becvár, Michal Pechoucek, Lubos Sm&iac...
CSL
2010
Springer
13 years 7 months ago
Improving supervised learning for meeting summarization using sampling and regression
Meeting summarization provides a concise and informative summary for the lengthy meetings and is an effective tool for efficient information access. In this paper, we focus on ext...
Shasha Xie, Yang Liu