Sciweavers

2645 search results - page 509 / 529
» Autonomous security for autonomous systems
Sort
View
CHI
2009
ACM
14 years 10 months ago
Can machines call people?: user experience while answering telephone calls initiated by machine
Current state-of?the-art spoken dialog systems are aimed at handling telephone calls to automate incoming caller requests. In this paper we explore a scenario which is symmetric t...
Adam J. Sporka, Jakub Franc, Giuseppe Riccardi
CHI
2007
ACM
14 years 10 months ago
Museum guide robot based on sociological interaction analysis
We are currently working on a museum guide robot with an emphasis on "friendly" human-robot interaction displayed through nonverbal behaviors. In this paper, we focus on...
Yoshinori Kuno, Kazuhisa Sadazuka, Michie Kawashim...
SIGMOD
2003
ACM
136views Database» more  SIGMOD 2003»
14 years 10 months ago
A Characterization of the Sensitivity of Query Optimization to Storage Access Cost Parameters
Most relational query optimizers make use of information about the costs of accessing tuples and data structures on various storage devices. This information can at times be off b...
Frederick Reiss, Tapas Kanungo
SIGMOD
2002
ACM
112views Database» more  SIGMOD 2002»
14 years 10 months ago
Minimal probing: supporting expensive predicates for top-k queries
This paper addresses the problem of evaluating ranked top-? queries with expensive predicates. As major DBMSs now all support expensive user-defined predicates for Boolean queries...
Kevin Chen-Chuan Chang, Seung-won Hwang
PERCOM
2003
ACM
14 years 9 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...