Sciweavers

502 search results - page 84 / 101
» Deploying a New Hash Algorithm
Sort
View
ENTCS
2006
90views more  ENTCS 2006»
14 years 11 months ago
Runtime Verification for High-Confidence Systems: A Monte Carlo Approach
We present a new approach to runtime verification that utilizes classical statistical techniques such as Monte Carlo simulation, hypothesis testing, and confidence interval estima...
Sean Callanan, Radu Grosu, Abhishek Rai, Scott A. ...
JCM
2006
135views more  JCM 2006»
14 years 11 months ago
Bandwidth Allocation and Session Scheduling using SIP
Session Initiation Protocol (SIP) is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SI...
Hassan Hassan 0002, Jean-Marie Garcia, Olivier Bru...
ASE
2005
96views more  ASE 2005»
14 years 11 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton
MICAI
2010
Springer
14 years 10 months ago
Teaching a Robot to Perform Tasks with Voice Commands
The full deployment of service robots in daily activities will require the robot to adapt to the needs of non-expert users, particularly, to learn how to perform new tasks from “...
Ana C. Tenorio-Gonzalez, Eduardo F. Morales, Luis ...
TKDE
2010
224views more  TKDE 2010»
14 years 10 months ago
Probabilistic Topic Models for Learning Terminological Ontologies
—Probabilistic topic models were originally developed and utilised for document modeling and topic extraction in Information Retrieval. In this paper we describe a new approach f...
Wang Wei, Payam M. Barnaghi, Andrzej Bargiela