The development of intelligent assistants has largely benefited from the adoption of decision-theoretic (DT) approaches that enable an agent to reason and account for the uncertai...
Bowen Hui, Sean Gustafson, Pourang Irani, Craig Bo...
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
We present an algorithm for multi-person tracking-bydetection
in a particle filtering framework. To address the
unreliability of current state-of-the-art object detectors, our
a...
Michael D. Breitenstein, Fabian Reichlin, Bastian ...
Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...