Sciweavers

2261 search results - page 384 / 453
» Dynamic types for authentication
Sort
View
IS
2011
13 years 15 days ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
DASFAA
2011
IEEE
251views Database» more  DASFAA 2011»
13 years 10 days ago
Towards Web Search by Sentence Queries: Asking the Web for Query Substitutions
In this paper, we propose a method to search the Web for sentence substitutions for a given sentence query. Our method uses only lexico-syntactic patterns dynamically generated fro...
Yusuke Yamamoto, Katsumi Tanaka
ECIR
2011
Springer
13 years 9 days ago
Weight-Based Boosting Model for Cross-Domain Relevance Ranking Adaptation
Adaptation techniques based on importance weighting were shown effective for RankSVM and RankNet, viz., each training instance is assigned a target weight denoting its importance ...
Peng Cai, Wei Gao, Kam-Fai Wong, Aoying Zhou
LR
2011
107views more  LR 2011»
12 years 11 months ago
Modeling and stability analysis of autonomously controlled production networks
Abstract We present methods and tools for modeling autonomously controlled production networks and investigation of their stability properties. Production networks are described as...
Sergey Dashkovskiy, Michael Görges, Michael K...
ICCV
2011
IEEE
12 years 8 months ago
Double Window Optimisation for Constant Time Visual SLAM
We present a novel and general optimisation framework for visual SLAM, which scales for both local, highly accurate reconstruction and large-scale motion with long loop closures. ...
Hauke Strasdat, Andrew J. Davison, J. M. M. Montie...