Sciweavers

7918 search results - page 1241 / 1584
» Model Composition Directives
Sort
View
164
Voted
PERCOM
2011
ACM
14 years 8 months ago
Is ontology-based activity recognition really effective?
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
PERCOM
2011
ACM
14 years 8 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
PERCOM
2011
ACM
14 years 8 months ago
Towards preserving privacy in participatory sensing
Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Leyla Kazemi, Cyrus Shahabi
165
Voted
ACL
2011
14 years 8 months ago
Event Extraction as Dependency Parsing
Nested event structures are a common occurrence in both open domain and domain specific extraction tasks, e.g., a “crime” event can cause a “investigation” event, which c...
David McClosky, Mihai Surdeanu, Christopher D. Man...
161
Voted
ECIR
2011
Springer
14 years 8 months ago
Balancing Exploration and Exploitation in Learning to Rank Online
Abstract. As retrieval systems become more complex, learning to rank approaches are being developed to automatically tune their parameters. Using online learning to rank approaches...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
« Prev « First page 1241 / 1584 Last » Next »