Sciweavers

411 search results - page 33 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
JIFS
2007
102views more  JIFS 2007»
14 years 9 months ago
Knowledge propagation in a distributed omnidirectional vision system
In this paper an omnidirectional Distributed Vision System (DVS) is presented. The presented DVS is able to learn to navigate a mobile robot in its working environment without any...
Emanuele Menegatti, C. Simionato, Stefano Tonello,...
PERCOM
2011
ACM
14 years 24 days ago
A robust dead-reckoning pedestrian tracking system with low cost sensors
—The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian...
Yunye Jin, Hong-Song Toh, Wee-Seng Soh, Wai-Choong...
DLOG
2001
14 years 11 months ago
Using Lazy Unfolding for the Computation of Least Common Subsumers
For description logics with existential restrictions, the size of the least common subsumer (lcs) of concept descriptions may grow exponentially in the size of the concept descrip...
Anni-Yasmin Turhan, Ralf Molitor
EMNLP
2010
14 years 8 months ago
Constraints Based Taxonomic Relation Classification
Determining whether two terms in text have an ancestor relation (e.g. Toyota and car) or a sibling relation (e.g. Toyota and Honda) is an essential component of textual inference ...
Quang Do, Dan Roth
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...