Sciweavers

764 search results - page 100 / 153
» Information Fusion
Sort
View
GI
2007
Springer
14 years 1 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch
CIDR
2007
138views Algorithms» more  CIDR 2007»
13 years 11 months ago
MOMA - A Mapping-based Object Matching System
Object matching or object consolidation is a crucial task for data integration and data cleaning. It addresses the problem of identifying object instances in data sources referrin...
Andreas Thor, Erhard Rahm
HCI
2007
13 years 11 months ago
Artificial Psychology
—In the field of human robot interaction (HRI), providing robot with emotions and psychology like human can be useful to achieve natural interaction. Previous HRI research focuse...
Zhiliang Wang
CG
1999
Springer
13 years 9 months ago
There is more to context than location
Context is a key issue in interaction between human and computer, describing the surrounding facts that add meaning. In mobile computing research published the parameter location ...
Albrecht Schmidt, Michael Beigl, Hans-Werner Gelle...
CLEF
2005
Springer
14 years 3 months ago
SINAI at CLEF 2005: Multi-8 Two-Years-on and Multi-8 Merging-Only Tasks
This year, we have participated on multilingual two years on and Multi-8 merging-only CLEF task. Our main interest has been to test several usual CLIR tasks and investigate how th...
Fernando Martínez Santiago, Miguel Angel Ga...