Sciweavers

3565 search results - page 639 / 713
» Modeling a system controller for timing analysis
Sort
View
117
Voted
CCS
2001
ACM
15 years 7 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
GMP
2006
IEEE
127views Solid Modeling» more  GMP 2006»
15 years 9 months ago
Finding All Undercut-Free Parting Directions for Extrusions
For molding and casting processes, geometries that have undercut-free parting directions (UFPDs) are preferred for manufacturing. Identifying all UFPDs for arbitrary geometries at ...
Xiaorui Chen, Sara McMains
136
Voted
IWANN
2009
Springer
15 years 7 months ago
Easing the Smart Home: Translating Human Hierarchies to Intelligent Environments
Abstract. Ubiquitous computing research have extended traditional environments in the so–called Intelligent Environments. All of them use their capabilities for pursuing their in...
Manuel García-Herranz, Pablo A. Haya, Xavie...
IAT
2009
IEEE
15 years 9 months ago
An Intelligent Agent That Autonomously Learns How to Translate
—We describe the design of an autonomous agent that can teach itself how to translate from a foreign language, by first assembling its own training set, then using it to improve...
Marco Turchi, Tijl De Bie, Nello Cristianini
CIKM
2007
Springer
15 years 9 months ago
Developing learning strategies for topic-based summarization
Most up-to-date well-behaved topic-based summarization systems are built upon the extractive framework. They score the sentences based on the associated features by manually assig...
Ouyang You, Sujian Li, Wenjie Li