Sciweavers

1486 search results - page 196 / 298
» Firewall Rules Analysis
Sort
View
INFOSCALE
2007
ACM
15 years 5 months ago
Ontology driven adaptive data processing in wireless sensor networks
It is important to provide adaptive data processing in wireless sensor networks in order to deal with various applications. In this paper,we propose a WIreless Sensor Networks Ont...
Yuheng Hu, Zhendong Wu, Ming Guo
110
Voted
LREC
2008
80views Education» more  LREC 2008»
15 years 5 months ago
Phone Segmentation Tool with Integrated Pronunciation Lexicon and Czech Phonetically Labelled Reference Database
Phonetic segmentation is the procedure which is used in many applications of speech processing, both as a subpart of automated systems or as the tool for an interactive work. In t...
Petr Pollák, Jan Volín, Radek Skarni...
149
Voted
NIPS
2008
15 years 5 months ago
Overlaying classifiers: a practical approach for optimal ranking
ROC curves are one of the most widely used displays to evaluate performance of scoring functions. In the paper, we propose a statistical method for directly optimizing the ROC cur...
Stéphan Clémençon, Nicolas Va...
151
Voted
ISIM
2007
15 years 5 months ago
Verification of Good Design Style of UML Models
Software architecture, and its behavior can be expressed as UML models. Models of complex systems can be also complex and hard to read – they may consists of hundreds of artifact...
Bogumila Hnatkowska
JURIX
2007
15 years 5 months ago
Arguments, Values and Baseballs: Representation of Popov v. Hayashi
In this paper, we model a recent legal case as presented in a court of first instance using argument schemes and an argumentation framework, providing a formal analysis of the cas...
Adam Zachary Wyner, Trevor J. M. Bench-Capon, Kati...