Abstract. This article presents a new open-source C++ implementation to solve the SLAM problem, which is focused on genericity, versatility and high execution speed. It is based on...
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Journals, letters, and other writings are of great value to historians and those who research their own family history; however, it can be difficult to find writings by specific...
Douglas J. Kennard, William B. Lund, Bryan S. Mors...
In this paper we discuss a number of implications which follow from the way that the information systems discipline has developed, largely separately, from computer ethics. These ...
A well-known challenge of information retrieval is how to infer a user's underlying information need when the input query consists of only a few keywords. Question Answering (...