Sciweavers

293 search results - page 35 / 59
» Towards an Automatic Modeling Tool for Observed System Behav...
Sort
View
AIED
2009
Springer
14 years 3 months ago
I learn from you, you learn from me: How to make iList learn from students
We developed a new model for iList, our system that helps students learn linked list. The model is automatically extracted from past student data, and allows iList to track student...
Davide Fossati, Barbara Di Eugenio, Stellan Ohlsso...
FTCS
1998
114views more  FTCS 1998»
13 years 10 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
TCSV
2008
102views more  TCSV 2008»
13 years 8 months ago
Semantic Analysis for Automatic Event Recognition and Segmentation of Wedding Ceremony Videos
Wedding is one of the most important ceremonies in our lives. It symbolizes the birth and creation of a new family. In this paper, we present a system for automatically segmenting ...
Wen-Huang Cheng, Yung-Yu Chuang, Yin-Tzu Lin, Chi-...
ICASSP
2008
IEEE
14 years 3 months ago
Impact of mismatched statistics on correlated MIMO capacity
Many recent works that study the impact of spatial correlation on the performance of multi-input multi-output (MIMO) systems assume a separable (also known as the Kronecker) model...
Vasanthan Raghavan, Akbar M. Sayeed, Jayesh H. Kot...
INFOCOM
2009
IEEE
14 years 3 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem