Sciweavers

778 search results - page 155 / 156
» From Public Views to Private Views - Correctness-by-Design f...
Sort
View
AVI
2006
13 years 8 months ago
The prospects for unrestricted speech input for TV content search
The need for effective search for television content is growing as the number of choices for TV viewing and/or recording explodes. In this paper we describe a preliminary prototyp...
Kent Wittenburg, Tom Lanning, Derek L. Schwenke, H...
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
13 years 8 months ago
A no-free-lunch framework for coevolution
The No-Free-Lunch theorem is a fundamental result in the field of black-box function optimization. Recent work has shown that coevolution can exhibit free lunches. The question a...
Travis C. Service, Daniel R. Tauritz
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 7 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
IPM
2006
157views more  IPM 2006»
13 years 7 months ago
Collaborative bibliography
A bibliography is traditionally characterized by the judgments, bounded by explicit selection criteria, made by a single compiler. Because these criteria concern the attributes as...
David G. Hendry, J. R. Jenkins, Joseph F. McCarthy
JUCS
2008
120views more  JUCS 2008»
13 years 7 months ago
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
: In communication systems that guarantee seamless mobility of users across service areas, repeated attempts occur as a result of user behavior but also as automatic retries of blo...
José Manuel Giménez-Guzmán, M...