Sciweavers

1937 search results - page 301 / 388
» Starting B Specifications from Use Cases
Sort
View
LREC
2008
118views Education» more  LREC 2008»
15 years 6 months ago
What would you Ask a conversational Agent? Observations of Human-Agent Dialogues in a Museum Setting
Embodied Conversational Agents have typically been constructed for use in limited domain applications, and tested in very specialized environments. Only in recent years have there...
Susan Robinson, David R. Traum, Midhun Ittycheriah...
LISA
2001
15 years 6 months ago
The CoralReef Software Suite as a Tool for System and Network Administrators
Until now, system administrators have lacked a flexible real-time network traffic flow monitoring package. Such a package must provide a wide range of services but remain flexible ...
David Moore, Ken Keys, Ryan Koga, Edouard Lagache,...
IJCAI
1989
15 years 5 months ago
A Study of Empirical Learning for an Involved Problem
In real-world domains a concept to be learned may be unwieldy and the environment may be less than ideal. One combination of difficulties occurs if the concept is probabilistic an...
Larry A. Rendell
CORR
2008
Springer
86views Education» more  CORR 2008»
15 years 4 months ago
Capacity Regions and Bounds for a Class of Z-interference Channels
We define a class of Z-interference channels for which we obtain a new upper bound on the capacity region. The bound exploits a technique first introduced by Korner and Marton. A ...
Nan Liu, Andrea J. Goldsmith
CCR
2006
76views more  CCR 2006»
15 years 4 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato