Sciweavers

2043 search results - page 330 / 409
» Reasoning About Security Models
Sort
View
125
Voted
GIS
2010
ACM
14 years 11 months ago
Location disambiguation in local searches using gradient boosted decision trees
Local search is a specialization of the web search that allows users to submit geographically constrained queries. However, one of the challenges for local search engines is to un...
Ritesh Agrawal, James G. Shanahan
193
Voted
GIS
2003
ACM
16 years 1 months ago
Nearest neighbor queries in road networks
With wireless communications and geo-positioning being widely available, it becomes possible to offer new e-services that provide mobile users with information about other mobile ...
Christian S. Jensen, Jan Kolárvr, Torben Ba...
85
Voted
CHI
2004
ACM
16 years 1 months ago
If not now, when?: the effects of interruption at different moments within task execution
User attention is a scarce resource, and users are susceptible to interruption overload. Systems do not reason about the effects of interrupting a user during a task sequence. In ...
Piotr D. Adamczyk, Brian P. Bailey
112
Voted
HRI
2010
ACM
15 years 7 months ago
Toward understanding natural language directions
—Speaking using unconstrained natural language is an intuitive and flexible way for humans to interact with robots. Understanding this kind of linguistic input is challenging be...
Thomas Kollar, Stefanie Tellex, Deb Roy, Nicholas ...
118
Voted
HYBRID
2010
Springer
15 years 7 months ago
From synchronous programs to symbolic representations of hybrid systems
In this paper, we present an extension of the synchronous language Quartz by new kinds of variables, actions and statements for modeling the interaction of synchronous systems wit...
Kerstin Bauer, Klaus Schneider