Sciweavers

240 search results - page 40 / 48
» What do you know
Sort
View
COMPSAC
1997
IEEE
14 years 3 hour ago
Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis
We have investigated a fault injection-based technique for undermining the ability of software components to produce undesirable outputs into the state of the system. Undesirable ...
Jeffrey M. Voas
HICSS
1997
IEEE
122views Biometrics» more  HICSS 1997»
14 years 25 min ago
Developing Trust in Virtual Teams
A research project with distributed electronic teams was conducted to examine how virtual temporary teams quickly develop and maintain trust relationships with people that they ha...
Suzanne Iacono, Suzanne P. Weisband
EMNLP
2008
13 years 9 months ago
A comparison of Bayesian estimators for unsupervised Hidden Markov Model POS taggers
There is growing interest in applying Bayesian techniques to NLP problems. There are a number of different estimators for Bayesian models, and it is useful to know what kinds of t...
Jianfeng Gao, Mark Johnson
CIDR
2003
150views Algorithms» more  CIDR 2003»
13 years 9 months ago
The Database Machine: Old Story, New Slant?
Current database management system technology is not well equipped to provide adequate support for what has been deemed the 3rd wave of computing -- Ubiquitous Computing. Such app...
Julie A. McCann
ICMAS
2000
13 years 9 months ago
Safe Exchange Planner
Safe exchange is a key issue in multiagent systems, especially in electronic transactions where nondelivery is a major problem. In this paper we present a unified framework for mo...
Tuomas Sandholm, Vincent Ferrandon