Sciweavers

3674 search results - page 287 / 735
» Information Dependencies
Sort
View
99
Voted
DSN
2006
IEEE
15 years 6 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
102
Voted
IEEESCC
2006
IEEE
15 years 6 months ago
Personalized Active Service Spaces for End-User Service Composition
End-user service composition is a promising way to ensure flexible, quick and personalized information provision and utilization, and consequently to better cope with spontaneous ...
Jun Han, Yanbo Han, Yan Jin, Jianwu Wang, Jian Yu
108
Voted
MSWIM
2006
ACM
15 years 6 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
SIGIR
2006
ACM
15 years 6 months ago
Bias and the limits of pooling
Modern retrieval test collections are built through a process called pooling in which only a sample of the entire document set is judged for each topic. The idea behind pooling is...
Chris Buckley, Darrin Dimmick, Ian Soboroff, Ellen...
82
Voted
AIED
2005
Springer
15 years 6 months ago
Cross-Cultural Evaluation of Politeness in Tactics for Pedagogical Agents
Politeness may play a role in tutorial interaction, including promoting learner motivation and avoiding negative affect. Politeness theory can account for this as a means of mitiga...
W. Lewis Johnson, Richard E. Mayer, Elisabeth Andr...