Sciweavers

2796 search results - page 492 / 560
» The coolest path problem
Sort
View
USS
2010
14 years 11 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
144
Voted
VTC
2010
IEEE
167views Communications» more  VTC 2010»
14 years 11 months ago
The Impact of Fading on the Outage Probability in Cognitive Radio Networks
Abstract--This paper analyzes the outage probability in cognitive radio networks, based on the Poisson point process model of node spatial distribution and the standard propagation...
Yaobin Wen, Sergey Loyka, Abbas Yongaçoglu
CDC
2009
IEEE
170views Control Systems» more  CDC 2009»
14 years 11 months ago
ESMF based multiple UAVs active cooperative observation method in relative velocity coordinates
based on extended set-membership filter (ESMF) and the path planning method in relative velocity coordinates (RVCs), a new 3D multiple Unmanned Aerial Vehicle (UAV) systems active ...
Feng Gu, Yuqing He, Jianda Han, Yuechao Wang
HCI
2009
14 years 11 months ago
Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System
The main goal of dialog management is to provide all information needed to perform e. g. a SQL-query, a navigation task, etc. Two principal approaches for dialog management systems...
Stefan Schwärzler, Günther Ruske, Frank ...
ICWSM
2009
14 years 11 months ago
Targeting Sentiment Expressions through Supervised Ranking of Linguistic Configurations
User generated content is extremely valuable for mining market intelligence because it is unsolicited. We study the problem of analyzing users' sentiment and opinion in their...
Jason S. Kessler, Nicolas Nicolov