Sciweavers

1791 search results - page 110 / 359
» Behavioral Operations
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
A Node Identity Internetworking Architecture
— The Internet consists of independent networks that belong to different administrative domains and vary in scope from personal area networks, private home networks, corporate ne...
Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Raja...
ISMIR
2004
Springer
173views Music» more  ISMIR 2004»
15 years 10 months ago
Stochastic Model of a Robust Audio Fingerprinting System
An audio fingerprint is a compact representation of the perceptually relevant parts of audio content. A suitable audio fingerprint can be used to identify audio files, even if ...
Peter Jan O. Doets, Reginald L. Lagendijk
USS
2008
15 years 7 months ago
Measurement and Classification of Humans and Bots in Internet Chat
The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to distribute spam and malwa...
Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haini...
139
Voted
BPM
2010
Springer
191views Business» more  BPM 2010»
15 years 5 months ago
Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis
Abstract. A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is sub...
Wil M. P. van der Aalst, Niels Lohmann, Marcello L...
ENTCS
2007
101views more  ENTCS 2007»
15 years 4 months ago
A Framework for Timed Concurrent Constraint Programming with External Functions
The timed concurrent constraint programming language (tccp in short) was introduced for modeling reactive systems. This language allows one to model in a very intuitive way typica...
María Alpuente, Bernhard Gramlich, Alicia V...