Sciweavers

344 search results - page 61 / 69
» Automated Weld Tracking
Sort
View
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
14 years 2 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev
CCS
2006
ACM
14 years 1 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
APLAS
2010
ACM
13 years 10 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
CSL
2007
Springer
13 years 9 months ago
Accessing speech data using strategic fixation
When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ...
Steve Whittaker, Julia Hirschberg
TASE
2008
IEEE
13 years 9 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu