Sciweavers

1210 search results - page 166 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
126
Voted
CAISE
2006
Springer
15 years 7 months ago
Personalisation of Next Generation Mobile Services
Abstract. As communication technologies are becoming more and more advanced, the opportunities to deliver improved, user friendly services using these technologies are increasing. ...
Ivar Jørstad, Do Van Thanh, Schahram Dustda...
134
Voted
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
143
Voted
IJCAI
1997
15 years 5 months ago
Learning Topological Maps with Weak Local Odometric Information
cal maps provide a useful abstraction for robotic navigation and planning. Although stochastic mapscan theoreticallybe learned using the Baum-Welch algorithm,without strong prior ...
Hagit Shatkay, Leslie Pack Kaelbling
139
Voted
WSC
1997
15 years 5 months ago
The Impact of Transients on Simulation Variance Estimators
Given a stationary simulation process with unknown mean µ , interest frequently lies in, and various methods exist for, developing estimates and confidence intervals for µ . Typ...
Daniel H. Ockerman, David Goldsman
ENTCS
2006
144views more  ENTCS 2006»
15 years 3 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy