Sciweavers

757 search results - page 60 / 152
» How to decide
Sort
View
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 8 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
ICASSP
2008
IEEE
14 years 3 months ago
Using dialogue acts to learn better repair strategies for spoken dialogue systems
Repair or error-recovery strategies are an important design issue in Spoken Dialogue Systems (SDSs) - how to conduct the dialogue when there is no progress (e.g. due to repeated A...
Matthew Frampton, Oliver Lemon
AAAI
2004
13 years 10 months ago
Making Argumentation More Believable
There are a number of frameworks for modelling argumentation in logic. They incorporate a formal representation of individual arguments and techniques for comparing conflicting ar...
Anthony Hunter
MC
2003
170views Computer Science» more  MC 2003»
13 years 10 months ago
Social navigation: from the web to the mobile
Social navigation is the alternative way of looking upon navigation in the virtual world: e g instead of navigating the web by maps and hierarchies and search engines, you would n...
Kristina Höök
ADHOC
2010
292views more  ADHOC 2010»
13 years 9 months ago
Sleep/wake scheduling for multi-hop sensor networks: Non-convexity and approximation algorithm
We investigate the problem of sleep/wake scheduling for low duty cycle sensor networks. Our work differs from prior work in that we explicitly consider the effect of synchronizati...
Yan Wu, Sonia Fahmy, Ness B. Shroff