This paper describes our work in examining the question of whether providing a visual informatics application in an educational scenario, in particular, providing video content ana...
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
In this paper, we present a concept for an open vehicular data interface and describe it’s components and architecture. We discuss the enabled applications in the context of adv...
Matthias Kranz, Eduard Weber, Korbinian Frank, Dan...
This paper describes a simple clustering approach to person name disambiguation of retrieved documents. The methods are based on standard IR concepts and do not require any task-s...
Evaluation of sentiment analysis, like large-scale IR evaluation, relies on the accuracy of human assessors to create judgments. Subjectivity in judgments is a problem for relevan...