Sciweavers

764 search results - page 106 / 153
» Information Fusion
Sort
View
WSC
2007
14 years 10 days ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
AIRS
2005
Springer
14 years 3 months ago
Calculating Webpage Importance with Site Structure Constraints
PageRank is one of the most popular link analysis algorithms that have shown their effectiveness in web search. However, PageRank only consider hyperlink information. In this paper...
Hui-Min Yan, Tao Qin, Tie-Yan Liu, Xu-Dong Zhang, ...
ESWA
2010
154views more  ESWA 2010»
13 years 8 months ago
Robust speech interaction in motorcycle environment
Aiming at robust spoken dialogue interaction in motorcycle environment, we investigate various configurations for a speech front-end, which consists of speech pre-processing, spee...
Iosif Mporas, Otilia Kocsis, Todor Ganchev, Nikos ...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 8 months ago
On Scaling Laws of Diversity Schemes in Decentralized Estimation
This paper is concerned with decentralized estimation of a Gaussian source using multiple sensors. We consider a diversity scheme where only the sensor with the best channel sends...
Alex S. Leong, Subhrakanti Dey
EPIA
2009
Springer
14 years 1 months ago
Obstacle Detection, Identification and Sharing on a Robotic Soccer Team
When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
João Silva, Nuno Lau, António J. R. ...