Sciweavers

326 search results - page 46 / 66
» Can Affect Be Detected from Intelligent Tutoring System Inte...
Sort
View
CIKM
2005
Springer
14 years 1 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
FLAIRS
2010
13 years 5 months ago
Using Ontologies in Case-Based Activity Recognition
Pervasive computing requires the ability to detect user activity in order to provide situation-specific services. Case-based reasoning can be used for activity recognition by usin...
Stephen Knox, Lorcan Coyle, Simon Dobson
RTSS
2008
IEEE
14 years 2 months ago
Merge-by-Wire: Algorithms and System Support
Automakers are trying to make vehicles more intelligent and safe by embedding processors which can be used to implement by-wire applications for taking smart decisions on the road...
Vipul Shingde, Gurulingesh Raravi, Ashish Gudhe, P...
AOSE
2007
Springer
13 years 11 months ago
AgentPrIMe: Adapting MAS Designs to Build Confidence
The products of systems cannot always be judged at face value: the process by which they were obtained is also important. For instance, the rigour of a scientific experiment, the e...
Simon Miles, Paul T. Groth, Steve Munroe, Michael ...
GI
2009
Springer
13 years 5 months ago
Contact Fusion and Multi-Hypotheses Tracking for Low Frequency Active Sonar Data
Abstract: Towed low frequency active sonar systems (LFAS) are used in Anti-Submarine Warfare (ASW) to detect submarines. LFAS systems are hampered by reverberation in shallow water...
Kathrin Seget, Holger Schmaljohann, Arne Schulz