Sciweavers

46 search results - page 3 / 10
» Intruder Theories (Ongoing Work)
Sort
View
CHI
2003
ACM
13 years 10 months ago
Emotional interaction
This paper discusses the association of emotions as an underlying component of everyday human-computer interaction. It presents the ongoing work in the design of an experiment to ...
Pedro Branco
ADAEUROPE
2008
Springer
14 years 26 days ago
Can We Increase the Usability of Real Time Scheduling Theory? The Cheddar Project
The Cheddar project deals with real time scheduling theory. Many industrial projects do not perform performance analysis with real time scheduling theory even if the demand for the...
Frank Singhoff, Alain Plantec, Pierre Dissaux
ICALP
2010
Springer
13 years 6 months ago
Towards a Theory of Time-Bounded Verification
Abstract. We propose a theory of time-bounded verification for realtime systems, in which verification queries are phrased over time intervals of fixed, bounded duration. We argue ...
Joël Ouaknine, James Worrell
INLG
2010
Springer
13 years 4 months ago
Applying Semantic Frame Theory to Automate Natural Language Template Generation From Ontology Statements
Today there exist a growing number of framenet-like resources offering semantic and syntactic phrase specifications that can be exploited by natural language generation systems. I...
Dana Dannélls
MOBIHOC
2010
ACM
13 years 4 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang