Sciweavers

2372 search results - page 139 / 475
» Probabilistic calling context
Sort
View
CVPR
2003
IEEE
15 years 13 days ago
Constrained Subspace Modelling
When performing subspace modelling of data using Principal Component Analysis (PCA) it may be desirable to constrain certain directions to be more meaningful in the context of the...
Jaco Vermaak, Patrick Pérez
ICML
2000
IEEE
14 years 11 months ago
Constructive Feature Learning and the Development of Visual Expertise
We present a framework for learning features for visual discrimination. The learning system is exposed to a sequence of training images. Whenever it fails to recognize a visual co...
Justus H. Piater, Roderic A. Grupen
CHI
2004
ACM
14 years 10 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
14 years 5 months ago
Modeling RFID signal strength and tag detection for localization and mapping
— In recent years, there has been an increasing interest within the robotics community in investigating whether Radio Frequency Identification (RFID) technology can be utilized ...
Dominik Joho, Christian Plagemann, Wolfram Burgard