Sciweavers

1798 search results - page 244 / 360
» Generating presentation constraints from rhetorical structur...
Sort
View
125
Voted
LOGCOM
2002
142views more  LOGCOM 2002»
15 years 13 days ago
Two Logical Theories of Plan Recognition
We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
Wayne Wobcke
PERCOM
2007
ACM
16 years 11 days ago
Supporting Mobile Service Usage through Physical Mobile Interaction
Although mobile services can be used ubiquitously, their employment and the interaction with them are still restricted by the constraints of mobile devices. In order to facilitate...
Gregor Broll, Sven Siorpaes, Enrico Rukzio, Massim...
261
Voted
INFOCOM
2005
IEEE
15 years 6 months ago
Joint congestion control and media access control design for ad hoc wireless networks
Abstract— We present a model for the joint design of congestion control and media access control (MAC) for ad hoc wireless networks. Using contention graph and contention matrix,...
Lijun Chen, Steven H. Low, John C. Doyle
108
Voted
DATE
2000
IEEE
136views Hardware» more  DATE 2000»
15 years 5 months ago
On Applying Incremental Satisfiability to Delay Fault Testing
The Boolean satisfiability problem (SAT) has various applications in electronic design automation (EDA) fields such as testing, timing analysis and logic verification. SAT has bee...
Joonyoung Kim, Jesse Whittemore, Karem A. Sakallah...
MEDINFO
2007
116views Healthcare» more  MEDINFO 2007»
15 years 2 months ago
Knowledge-Level Querying of Temporal Patterns in Clinical Research Systems
Managing time-stamped data is essential to clinical research activities and often requires the use of considerable domain knowledge, which is difficult to support within database ...
Martin J. O'Connor, Ravi D. Shankar, David B. Parr...