Sciweavers

15251 search results - page 167 / 3051
» Network Science - Theory and Application
Sort
View
GI
2007
Springer
15 years 9 months ago
Fuzzy Operators for Confidence Modelling in Automotive Safety Applications
: The fusion of data from different sensorial sources is the most promising method to increase robustness and reliability of environmental perception today. The paper presents an a...
Ulrich Scheunert, Philipp Lindner, Eric Richter, G...
129
Voted
STACS
1999
Springer
15 years 7 months ago
Balanced Randomized Tree Splitting with Applications to Evolutionary Tree Constructions
We present a new technique called balanced randomized tree splitting. It is useful in constructing unknown trees recursively. By applying it we obtain two new results on efficient ...
Ming-Yang Kao, Andrzej Lingas, Anna Östlin
77
Voted
GI
2007
Springer
15 years 6 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch
115
Voted
CSREAEEE
2006
112views Business» more  CSREAEEE 2006»
15 years 4 months ago
A Development Tool for E-learning Applications
Task information support on the Web is not always an easy and straightforward process. Much of the information is inaccurate, biased, out-of-date, or just not thorough enough. The...
Darina Dicheva, Christo Dichev, Mohammed Ketel
149
Voted
CAD
2005
Springer
15 years 2 months ago
Shape-based searching for product lifecycle applications
Estimates suggest that more than 75% of engineering design activity comprises reuse of previous design knowledge to address a new design problem. Reusing design knowledge has grea...
Natraj Iyer, Subramaniam Jayanti, Kuiyang Lou, Yag...