Sciweavers

11 search results - page 1 / 3
» Exploitation of Argumentation Models for Mission Analysis
Sort
View
EXACT
2007
13 years 7 months ago
Exploitation of Argumentation Models for Mission Analysis
In a military context, the process of planning operations involves the assessment of the situation, the identification of the most appropriate course of action, the description of...
Micheline Bélanger
SECON
2010
IEEE
13 years 3 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang
IDEAL
2004
Springer
13 years 10 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin
LREC
2008
139views Education» more  LREC 2008»
13 years 6 months ago
Identification of Comparable Argument-Head Relations in Parallel Corpora
We present the machine learning framework that we are developing, in order to support explorative search for non-trivial linguistic configurations in low-density languages (langua...
Kathrin Spreyer, Jonas Kuhn, Bettina Schrader
DEBS
2010
ACM
13 years 9 months ago
Stochastic performance analysis and capacity planning of publish/subscribe systems
Publish/subscribe systems are used increasingly often as a communication mechanism in loosely-coupled distributed applications. With their gradual adoption in mission critical are...
Arnd Schröter, Gero Mühl, Samuel Kounev,...