Sciweavers

3373 search results - page 229 / 675
» Naturalistic Decision Making
Sort
View
ECIR
2010
Springer
13 years 11 months ago
Enabling Interactive Query Expansion through Eliciting the Potential Effect of Expansion Terms
Despite its potential to improve search effectiveness, previous research has shown that the uptake of interactive query expansion (IQE) is limited. In this paper, we investigate on...
Nuzhah Gooda Sahib, Anastasios Tombros, Ian Ruthve...
IPCO
2008
163views Optimization» more  IPCO 2008»
13 years 11 months ago
The Air Traffic Flow Management Problem: An Integer Optimization Approach
In this paper, we present a new Integer Program (IP) for the Air Traffic Flow Management (ATFM) problem. The model we propose provides a complete representation of all the phases o...
Dimitris Bertsimas, Guglielmo Lulli, Amedeo R. Odo...
CCN
2006
278views Communications» more  CCN 2006»
13 years 11 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
IADIS
2004
13 years 11 months ago
Detecting Unauthorized Use in Online Journal Archives: A Case Study
JSTOR is a not-for-profit online library containing a full back-run of digitized versions of a large number of academic journals. In order to help defray costs for maintaining the...
Paul Seligman, Sean W. Smith
UAI
1993
13 years 11 months ago
Utility-Based Abstraction and Categorization
Based Abstraction and Categorization Eric J. Horvitz∗ and Adrian C. Klein Palo Alto Laboratory Rockwell International Science Center 444 High Street Palo Alto, CA 94301 We take ...
Eric Horvitz, Adrian Klein