Sciweavers

525 search results - page 84 / 105
» Using Checkable Types in Automatic Protocol Analysis
Sort
View
ICMAS
2000
13 years 9 months ago
Reasoning About Others: Representing and Processing Infinite Belief Hierarchies
In this paper we focus on the problem of how infinite belief hierarchies can be represented and reasoned with in a computationally tractable way. When modeling nested beliefs one ...
Sviatoslav Brainov, Tuomas Sandholm
IWC
2007
121views more  IWC 2007»
13 years 7 months ago
Eye movements as indices for the utility of life-like interface agents: A pilot study
We motivate an approach to evaluating the utility of life-like interface agents that is based on human eye movements rather than questionnaires. An eye tracker is employed to obta...
Helmut Prendinger, Chunling Ma, Mitsuru Ishizuka
ICASSP
2011
IEEE
12 years 11 months ago
An adaptive approach to abnormal heart sound segmentation
Heart sound is one of the significant bio-signals to diagnose certain cardiac anomalies. Aiming to provide an automatic heart sounds analysis to medical professionals, we present...
Dinesh Kumar, Paulo Carvalho, Manuel Antunes, Rui ...
NAR
2010
140views more  NAR 2010»
13 years 2 months ago
GUIDANCE: a web server for assessing alignment confidence scores
Evaluating the accuracy of multiple sequence alignment (MSA) is critical for virtually every comparative sequence analysis that uses an MSA as input. Here we present the GUIDANCE ...
Osnat Penn, Eyal Privman, Haim Ashkenazy, Giddy La...
CN
2000
95views more  CN 2000»
13 years 7 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...