Sciweavers

7066 search results - page 1391 / 1414
» Contact Relations with Applications
Sort
View
CORR
2010
Springer
193views Education» more  CORR 2010»
13 years 6 months ago
A Probabilistic Approach for Learning Folksonomies from Structured Data
Learning structured representations has emerged as an important problem in many domains, including document and Web data mining, bioinformatics, and image analysis. One approach t...
Anon Plangprasopchok, Kristina Lerman, Lise Getoor
HUC
2010
Springer
13 years 6 months ago
UBI challenge workshop 2010: real world urban computing
This workshop promotes ubiquitous computing research in authentic urban setting, with real users and with sufficient scale and time span. We first motivate why such research is im...
Timo Ojala, Jukka Riekki
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
13 years 6 months ago
Real-time monocular SLAM: Why filter?
Abstract— While the most accurate solution to off-line structure from motion (SFM) problems is undoubtedly to extract as much correspondence information as possible and perform g...
Hauke Strasdat, J. M. M. Montiel, Andrew J. Daviso...
IJLIT
2010
67views more  IJLIT 2010»
13 years 6 months ago
Interoperability-Centric Problems: New Challenges and Legal Solutions
Whereas abandonment of detailed regulation is widely asserted to be the true way along with the fluctuations of the business models and emergence of IP-based services, there are s...
Turgut Ayhan Beydogan
INFOCOM
2010
IEEE
13 years 6 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
« Prev « First page 1391 / 1414 Last » Next »