Sciweavers

227 search results - page 39 / 46
» Defining and Monitoring Knowledge Integrity
Sort
View
TFS
2008
174views more  TFS 2008»
14 years 9 months ago
Type-2 Fuzzy Markov Random Fields and Their Application to Handwritten Chinese Character Recognition
In this paper, we integrate type-2 (T2) fuzzy sets with Markov random fields (MRFs) referred to as T2 FMRFs, which may handle both fuzziness and randomness in the structural patter...
Jia Zeng, Zhi-Qiang Liu
RTSS
2007
IEEE
15 years 3 months ago
FireFly Mosaic: A Vision-Enabled Wireless Sensor Networking System
— With the advent of CMOS cameras, it is now possible to make compact, cheap and low-power image sensors capable of on-board image processing. These embedded vision sensors provi...
Anthony Rowe, Dhiraj Goel, Raj Rajkumar
VLDB
2007
ACM
126views Database» more  VLDB 2007»
15 years 9 months ago
Querying Complex Structured Databases
Correctly generating a structured query (e.g., an XQuery or a SQL query) requires the user to have a full understanding of the database schema, which can be a daunting task. Alter...
Cong Yu, H. V. Jagadish
KES
2008
Springer
14 years 9 months ago
Classification and Retrieval through Semantic Kernels
Abstract. This work proposes a family of language-independent semantic kernel functions defined for individuals in an ontology. This allows exploiting wellfounded kernel methods fo...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
MOBIHOC
2003
ACM
15 years 9 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra