We present a novel method for information-theoretic exploration, leveraging recent work on mapping and localization. We describe exploration as the constrained optimization proble...
In various applications from radar processing to mobile communication systems based on CDMA for instance, M-AR multichannel processes are often considered and may be combined with...
Julien Petitjean, Eric Grivel, William Bobillet, P...
Laboratory studies have shown that when online search engines’ results are annotated with privacy indicators, some consumers will pay a premium to make purchases from sites that...
Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor...
Abstract— This paper presents the search problem formulated as a decision problem, where the searcher decides whether the target is present in the search region, and if so, where...
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...