Sciweavers

524 search results - page 53 / 105
» Why phishing works
Sort
View
ECBS
2007
IEEE
119views Hardware» more  ECBS 2007»
15 years 6 months ago
Diagnosis of Embedded Software Using Program Spectra
Automated diagnosis of errors detected during software testing can improve the efficiency of the debugging process, and can thus help to make software more reliable. In this pape...
Peter Zoeteweij, Rui Abreu, Rob Golsteijn, Arjan J...
LCN
2005
IEEE
15 years 5 months ago
Achieving Scalable Capacity in Wireless Networks with Adaptive Power Control
— The seminar work of Gupta and Kumar [1] showed that multi-hop wireless networks with capacity scalable with the number of nodes, n, are achievable in theory. The transport capa...
Ivan Wang Hei Ho, Soung Chang Liew
HRI
2007
ACM
15 years 3 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
ACL
1994
15 years 1 months ago
A Stochastic Finite-State Word-Segmentation Algorithm for Chinese
We present a stochastic finite-state model for segmenting Chinese text into dictionary entries and productively derived words, and providing pronunciations for these words; the me...
Richard Sproat, Chilin Shih, William Gale, Nancy C...
AGENTS
1998
Springer
15 years 4 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan