Sciweavers

1210 search results - page 166 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
CAISE
2006
Springer
14 years 20 days ago
Personalisation of Next Generation Mobile Services
Abstract. As communication technologies are becoming more and more advanced, the opportunities to deliver improved, user friendly services using these technologies are increasing. ...
Ivar Jørstad, Do Van Thanh, Schahram Dustda...
DSN
2008
IEEE
13 years 10 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
IJCAI
1997
13 years 10 months ago
Learning Topological Maps with Weak Local Odometric Information
cal maps provide a useful abstraction for robotic navigation and planning. Although stochastic mapscan theoreticallybe learned using the Baum-Welch algorithm,without strong prior ...
Hagit Shatkay, Leslie Pack Kaelbling
WSC
1997
13 years 10 months ago
The Impact of Transients on Simulation Variance Estimators
Given a stationary simulation process with unknown mean µ , interest frequently lies in, and various methods exist for, developing estimates and confidence intervals for µ . Typ...
Daniel H. Ockerman, David Goldsman
ENTCS
2006
144views more  ENTCS 2006»
13 years 9 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy