Sciweavers

948 search results - page 159 / 190
» Analysis of SITA policies
Sort
View
AAAI
2010
15 years 1 months ago
Decision-Theoretic Control of Crowd-Sourced Workflows
Crowd-sourcing is a recent framework in which human intelligence tasks are outsourced to a crowd of unknown people ("workers") as an open call (e.g., on Amazon's Me...
Peng Dai, Mausam, Daniel S. Weld
DIMVA
2007
15 years 1 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter
NETWORKING
2010
15 years 1 months ago
Measurement Study of Multi-party Video Conferencing
Abstract. More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies ...
Yue Lu, Yong Zhao, Fernando A. Kuipers, Piet Van M...
IIWAS
2008
15 years 1 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
LREC
2008
139views Education» more  LREC 2008»
15 years 1 months ago
Automatic Learning and Evaluation of User-Centered Objective Functions for Dialogue System Optimisation
The ultimate goal when building dialogue systems is to satisfy the needs of real users, but quality assurance for dialogue strategies is a non-trivial problem. The applied evaluat...
Verena Rieser, Oliver Lemon