Sciweavers

209 search results - page 30 / 42
» Exploiting Information Relationships for Access Control
Sort
View
IJCAI
1989
13 years 12 months ago
A Model for Projection and Action
In designing autonomous agents that deal competently with issues involving time and space, there is a tradeoff to be made between guaranteed response-time reactions on the one han...
Keiji Kanazawa, Thomas Dean
PAMI
2008
132views more  PAMI 2008»
13 years 10 months ago
Trajectory Association across Multiple Airborne Cameras
A camera mounted on an aerial vehicle provides an excellent means to monitor large areas of a scene. Utilizing several such cameras on different aerial vehicles allows further flex...
Yaser Sheikh, Mubarak Shah
PKDD
2004
Springer
205views Data Mining» more  PKDD 2004»
14 years 4 months ago
Breaking Through the Syntax Barrier: Searching with Entities and Relations
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Soumen Chakrabarti
SEMWEB
2007
Springer
14 years 4 months ago
X-SOM Results for OAEI 2007
This paper summarizes the results of the X-SOM tool in the OAEI 2007 campaign. X-SOM is an extensible ontology mapper that combines various matching algorithms by means of a feed-f...
Carlo Curino, Giorgio Orsi, Letizia Tanca
SOUPS
2010
ACM
13 years 11 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong