Sciweavers

2094 search results - page 149 / 419
» A Bayesian Approach for User Modeling in Dialogue Systems
Sort
View
APCSAC
2003
IEEE
15 years 9 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
ISI
2006
Springer
15 years 4 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
SMC
2007
IEEE
134views Control Systems» more  SMC 2007»
15 years 10 months ago
A Petri net-based approach to QoS-aware configuration for web services
: With the development of enterprise-wide and cross-enterprise application integration and interoperation towards web service, web service providers try to not only fulfill the fun...
PengCheng Xiong, Yushun Fan, MengChu Zhou
ECAI
2006
Springer
15 years 8 months ago
Learning Behaviors Models for Robot Execution Control
Robust execution of robotic tasks is a difficult problem. In many situations, these tasks involve complex behaviors combining different functionalities (e.g. perception, localizat...
Guillaume Infantes, Félix Ingrand, Malik Gh...
IJON
2006
53views more  IJON 2006»
15 years 4 months ago
Sub-intrapersonal space analysis for face recognition
Bayesian subspace analysis has been successfully applied in face recognition. However, it suffers from its operating on a whole face difference and using one global linear subspac...
Xiaoyang Tan, Jun Liu, Songcan Chen