Sciweavers

1615 search results - page 255 / 323
» Dark application communities
Sort
View
GIS
2010
ACM
13 years 5 months ago
Kernelized map matching
Map matching is a fundamental operation in many applications such as traffic analysis and location-aware services, the killer apps for ubiquitous computing. In the past, several m...
Ahmed Jawad, Kristian Kersting
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
13 years 5 months ago
GenoM3: Building middleware-independent robotic components
The topic of reusable software in robotics is now largely addressed. Components based architectures, where components are independent units that can be reused accross applications,...
Anthony Mallet, Cédric Pasteur, Matthieu He...
USS
2010
13 years 5 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
AIRS
2010
Springer
13 years 5 months ago
Tuning Machine-Learning Algorithms for Battery-Operated Portable Devices
Machine learning algorithms in various forms are now increasingly being used on a variety of portable devices, starting from cell phones to PDAs. They often form a part of standard...
Ziheng Lin, Yan Gu, Samarjit Chakraborty
CI
2011
110views more  CI 2011»
13 years 2 months ago
Experiences with planning for natural language generation
We investigate the application of modern planning techniques to domains arising from problems in natural language generation (NLG). In particular, we consider two novel NLGinspire...
Alexander Koller, Ronald P. A. Petrick