Sciweavers

2565 search results - page 420 / 513
» Integrating Natural Language Processing and Knowledge Based ...
Sort
View
MA
2001
Springer
98views Communications» more  MA 2001»
14 years 17 days ago
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
Mobile agent security is still a young discipline and most naturally, the focus up to the time of writing was on inventing new cryptographic protocols for securing various aspects ...
Volker Roth
DSN
2000
IEEE
14 years 16 days ago
Whither Generic Recovery from Application Faults? A Fault Study using Open-Source Software
This paper tests the hypothesis that generic recovery techniques, such as process pairs, can survive most application faults without using application-specific information. We ex...
Subhachandra Chandra, Peter M. Chen
FGR
2008
IEEE
156views Biometrics» more  FGR 2008»
13 years 10 months ago
Modelling human perception of static facial expressions
Data collected through a recent web-based survey show that the perception (i.e. labeling) of a human facial expression by a human observer is a subjective process, which results i...
Matteo Sorci, Jean-Philippe Thiran, J. Cruz, T. Ro...
ICMLA
2004
13 years 9 months ago
Emergent representations and reasoning in adaptive agents
Classically, cognition assumes that the underlying mechanisms of thinking are based on symbol manipulation processes. This assumption has several drawbacks, such as the issue of w...
Joost Broekens, Doug DeGroot
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...