Sciweavers

1465 search results - page 47 / 293
» Making the Correct Mistakes
Sort
View
IANDC
2008
128views more  IANDC 2008»
14 years 9 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
IJVR
2007
128views more  IJVR 2007»
14 years 9 months ago
Occlusion Management in Immersive and Desktop 3D Virtual Environments: Theory and Evaluation
—We present an empirical usability experiment studying the relative strengths and weaknesses of three different occlusion management techniques for discovering and accessing obje...
Niklas Elmqvist, Mihail Eduard Tudoreanu
ETS
2000
IEEE
126views Hardware» more  ETS 2000»
14 years 9 months ago
Dynamic Goal-Based Role-Play Simulation on the Web: A Case Study
This paper outlines and discusses the pedagogical approach, the technical design architecture, and an innovative implementation of a collaborative role-play simulation technology ...
Som Naidu, Albert Ip, Roni Linser
ALGORITHMICA
1998
103views more  ALGORITHMICA 1998»
14 years 9 months ago
On Bayes Methods for On-Line Boolean Prediction
We examine a general Bayesian framework for constructing on-line prediction algorithms in the experts setting. These algorithms predict the bits of an unknown Boolean sequence usin...
Nicolò Cesa-Bianchi, David P. Helmbold, San...
JCO
2010
75views more  JCO 2010»
14 years 8 months ago
A quadratic lower bound for Rocchio's similarity-based relevance feedback algorithm with a fixed query updating factor
Rocchio’s similarity-based relevance feedback algorithm, one of the most important query reformation methods in information retrieval, is essentially an adaptive supervised lear...
Zhixiang Chen, Bin Fu, John Abraham