Sciweavers

1778 search results - page 112 / 356
» Building a Knowledge Base: An Example
Sort
View
124
Voted
ICPR
2004
IEEE
16 years 1 months ago
Global Localization and Relative Pose Estimation Based on Scale-Invariant Features
The capability of maintaining the pose of the mobile robot is central for basic navigation and map building tasks. In this paper we describe a vision-based hybrid localization sch...
Jana Kosecka, Xiaolong Yang
MOBILWARE
2009
ACM
15 years 7 months ago
A Component-Based Approach for Realizing User-Centric Adaptive Systems
We discuss a generic architecture for building user-centric systems. The characteristic feature of such systems is a control loop that monitors the user’s state, and produces a h...
Gilbert Beyer, Moritz Hammer, Christian Kroiss, An...
ASIACRYPT
2001
Springer
15 years 5 months ago
How to Achieve a McEliece-Based Digital Signature Scheme
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. I...
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendri...
99
Voted
EDM
2010
140views Data Mining» more  EDM 2010»
15 years 2 months ago
Assessing Reviewer's Performance Based on Mining Problem Localization in Peer-Review Data
Current peer-review software lacks intelligence for responding to students' reviewing performance. As an example of an additional intelligent assessment component to such soft...
Wenting Xiong, Diane J. Litman, Christian D. Schun...
125
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 2 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin