Sciweavers

306 search results - page 17 / 62
» From Scenarios to Timed Automata: Building Specifications fr...
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 4 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
RIAO
2000
13 years 9 months ago
Allowing users to weight search terms
Informationretrieval systems typically weight the importance of search terms according to document and collection statistics (such as by using tf idf scores, where less commonterm...
Ronald Fagin, Yoëlle S. Maarek
UIST
2000
ACM
14 years 14 hour ago
Suede: a Wizard of Oz prototyping tool for speech user interfaces
Speech-based user interfaces are growing in popularity. Unfortunately, the technology expertise required to build speech UIs precludes many individuals from participating in the s...
Scott R. Klemmer, Anoop K. Sinha, Jack Chen, James...
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
13 years 5 months ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
TWC
2010
13 years 2 months ago
Efficient Spectrum Leasing via Randomized Silencing of Secondary Users
In this paper, a primary (licensed) user leases part of its resources to independent secondary (unlicensed) terminals in exchange for a tariff in dollars per bit, under the constra...
Rocco Di Taranto, Petar Popovski, Osvaldo Simeone,...