Sciweavers

3022 search results - page 114 / 605
» Make Way for WayMaker
Sort
View
100
Voted
PERVASIVE
2009
Springer
15 years 7 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
SEMCO
2009
IEEE
15 years 7 months ago
Enhanced Multimedia Content Access and Exploitation Using Semantic Speech Retrieval
—Techniques for automatic annotation of spoken content making use of speech recognition technology have long been characterized as holding unrealized promise to provide access to...
Roeland Ordelman, Franciska de Jong, Martha Larson
ISDA
2009
IEEE
15 years 7 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy
86
Voted
ATAL
2009
Springer
15 years 7 months ago
Evolutionary testing of autonomous software agents
A system built in terms of autonomous agents may require even greater correctness assurance than one which is merely reacting to the immediate control of its users. Agents make su...
Cu D. Nguyen, Anna Perini, Paolo Tonella, Simon Mi...
SSS
2009
Springer
103views Control Systems» more  SSS 2009»
15 years 7 months ago
Network-Friendly Gossiping
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on ...
Sabina Serbu, Etienne Riviere, Pascal Felber