Sciweavers

1487 search results - page 94 / 298
» Two Kinds of Metonymy
Sort
View
IJCNN
2000
IEEE
14 years 1 months ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta
IWSSD
2000
IEEE
14 years 1 months ago
Model Checking Implicit-Invocation Systems
While implicit invocation (publish-subscribe) systems have goodengineering properties, they are difficult toreason about and to test. Model checking such systems is an attractive...
David Garlan, Serge Khersonsky
CHI
2000
ACM
14 years 1 months ago
Tagged handles: merging discrete and continuous manual control
Discrete and continuous modes of manual control are fundamentally different: buttons select or change state, while handles persistently modulate an analog parameter. User interfac...
Karon E. MacLean, Scott S. Snibbe, Golan Levin
POPL
2000
ACM
14 years 1 months ago
Transforming Out Timing Leaks
It has been shown that secret information can be leaked to external observers through covert timing channels. In this paper we are concerned with a kind of timing attack that want...
Johan Agat
HICSS
1999
IEEE
98views Biometrics» more  HICSS 1999»
14 years 1 months ago
Collaborative Reputation Mechanisms in Electronic Marketplaces
The members of electronic communities are often unrelated to each other, they may have never met and have no information on each other's reputation. This kind of information ...
Giorgos Zacharia, Alexandros Moukas, Pattie Maes