Sciweavers

571 search results - page 94 / 115
» On Exploiting System Dynamics Modeling to Identify Service R...
Sort
View
PE
2011
Springer
321views Optimization» more  PE 2011»
14 years 6 months ago
Quasi-birth-and-death processes with restricted transitions and its applications
In this paper we identify a class of Quasi-Birth-and-Death (QBD) processes where the transitions to higher (resp. lower) levels are restricted to occur only from (resp. to) a subs...
Juan F. Pérez, Benny Van Houdt
70
Voted
ICASSP
2010
IEEE
14 years 12 months ago
Low-latency online speaker tracking on the AMI Corpus of meeting conversations
Ambient Inteligence aims to create smart spaces providing services in a transparent and non-intrusive fashion, so context awareness and user adaptation are key issues. Speech can ...
Maider Zamalloa, Luis Javier Rodríguez-Fuen...
ESWS
2007
Springer
15 years 5 months ago
Real-World Reasoning with OWL
Abstract. This work is motivated by experiences in the course of developing an ontology-based application within a real-world setting. We found out that current benchmarks are not ...
Timo Weithöner, Thorsten Liebig, Marko Luther...
WWW
2011
ACM
14 years 6 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
ICALT
2006
IEEE
15 years 5 months ago
Mobile Technology and Content Delivery in Education
The purpose of this workshop is to identify various issues that are pertinent to the development and delivery of content in the context of mobile devices. The workshop will focus ...
Rory McGreal, Kinshuk