Sciweavers

3693 search results - page 470 / 739
» User experience over time
Sort
View
CIKM
2009
Springer
15 years 3 months ago
Ensembles in adversarial classification for spam
The standard method for combating spam, either in email or on the web, is to train a classifier on manually labeled instances. As the spammers change their tactics, the performanc...
Deepak Chinavle, Pranam Kolari, Tim Oates, Tim Fin...
CAV
2010
Springer
172views Hardware» more  CAV 2010»
15 years 3 months ago
Symbolic Bounded Synthesis
Abstract. Synthesis of finite state systems from full linear time temporal logic (LTL) specifications is gaining more and more attention as several recent achievements have signi...
Rüdiger Ehlers
DCOSS
2009
Springer
15 years 3 months ago
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs
In this paper, we study the code distribution problem in multi-application wireless sensor networks (MA-WSNs), i.e., sensor networks that can support multiple applications. While M...
Weijia Li, Youtao Zhang, Bruce Childers
ICASSP
2009
IEEE
15 years 3 months ago
Chirp rate estimation of speech based on a time-varying quasi-harmonic model
The speech signal is usually considered as stationary during short analysis time intervals. Though this assumption may be sufficient in some applications, it is not valid for high...
Yannis Pantazis, Olivier Rosec, Yannis Stylianou
ECAI
2006
Springer
15 years 3 months ago
Automatic Generation of Implied Constraints
Abstract. A well-known difficulty with solving Constraint Satisfaction Problems (CSPs) is that, while one formulation of a CSP may enable a solver to solve it quickly, a different ...
John Charnley, Simon Colton, Ian Miguel