Sciweavers

144227 search results - page 109 / 28846
» Using
Sort
View
138
Voted
GLOBECOM
2010
IEEE
15 years 11 days ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
123
Voted
SIGDIAL
2010
15 years 7 days ago
Collaborating on Utterances with a Spoken Dialogue System Using an ISU-based Approach to Incremental Dialogue Management
When dialogue systems, through the use of incremental processing, are not bounded anymore by strict, nonoverlapping turn-taking, a whole range of additional interactional devices ...
Okko Buß, Timo Baumann, David Schlangen
EUSFLAT
2009
170views Fuzzy Logic» more  EUSFLAT 2009»
15 years 5 days ago
Decision Making in Competitive Location using Fuzzy Sets
This paper deals with the competitive location problems using fuzzy sets. The basic notions on fuzzy optimization and linear programming using fuzzy sets are briefly reviewed. The ...
Clara M. Campos, Lourdes Canós, Marí...
125
Voted
ICWSM
2009
15 years 3 days ago
An Examination of Language Use in Online Dating Profiles
This paper contributes to the study of self-presentation in online dating systems by performing a factor analysis on the text portions of online profiles. Findings include a simil...
Meenakshi Nagarajan, Marti A. Hearst
129
Voted
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
14 years 9 months ago
L2 gain verification for interconnections of locally stable systems using integral quadratic constraints
The paper establishes conditions which certify a local L2 gain for interconnections of locally stable systems. The approach involves improvements to local L2 gain estimation using ...
Erin Summers, Andrew K. Packard
« Prev « First page 109 / 28846 Last » Next »