Sciweavers

1038 search results - page 93 / 208
» Task Description
Sort
View
120
Voted
IAT
2009
IEEE
15 years 9 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
119
Voted
IJAHUC
2011
80views more  IJAHUC 2011»
14 years 6 months ago
The Smart Home meets the Web of Things
: In recent years, the merging of computing with physical things, enabled the transformation of everyday objects into information appliances. We propose to reuse the central princi...
Andreas Kamilaris, Andreas Pitsillides, Vlad Trifa
IJRR
2006
119views more  IJRR 2006»
15 years 2 months ago
Predicting the Performance of Cooperative Simultaneous Localization and Mapping (C-SLAM)
In this paper we study the time evolution of the position estimates' covariance in Cooperative Simultaneous Localization and Mapping (C-SLAM), and obtain analytical upper boun...
Anastasios I. Mourikis, Stergios I. Roumeliotis
KES
2008
Springer
15 years 2 months ago
Classification and Retrieval through Semantic Kernels
Abstract. This work proposes a family of language-independent semantic kernel functions defined for individuals in an ontology. This allows exploiting wellfounded kernel methods fo...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
DAWAK
1999
Springer
15 years 6 months ago
Modeling KDD Processes within the Inductive Database Framework
One of the most challenging problems in data manipulation in the future is to be able to e ciently handle very large databases but also multiple induced properties or generalizatio...
Jean-François Boulicaut, Mika Klemettinen, ...