Sciweavers

284 search results - page 27 / 57
» Explanation-based Scenario Generation for Reactive System Mo...
Sort
View
140
Voted
FORTE
2000
15 years 5 months ago
Systematic Performance Evaluation of Multipoint Protocols
The adventof multipoint(multicast-based) applications and the growth and complexity of the Internet has complicated network protocol design and evaluation. In this paper, we prese...
Ahmed Helmy, Sandeep K. S. Gupta, Deborah Estrin, ...
ICDCS
2002
IEEE
15 years 9 months ago
Cooperative Computing for Distributed Embedded Systems
The next generation of computing systems will be embedded, in a virtually unbounded number, and dynamically connected. The current software, network architectures, and their assoc...
Cristian Borcea, Deepa Iyer, Porlin Kang, Akhilesh...
ACL
2010
15 years 2 months ago
Optimising Information Presentation for Spoken Dialogue Systems
We present a novel approach to Information Presentation (IP) in Spoken Dialogue Systems (SDS) using a data-driven statistical optimisation framework for content planning and attri...
Verena Rieser, Oliver Lemon, Xingkun Liu
155
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
INAP
2001
Springer
15 years 8 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...