Sciweavers

2846 search results - page 188 / 570
» Real World Teleconferencing
Sort
View
ISI
2005
Springer
15 years 10 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
MIRRORBOT
2005
Springer
139views Robotics» more  MIRRORBOT 2005»
15 years 10 months ago
Neural Robot Detection in RoboCup
Abstract. Improving the game play in RoboCup middle size league requires a fast and robust visual robot detection system. The presented multilevel approach documents, that the comb...
Gerd Mayer, Ulrich Kaufmann, Gerhard K. Kraetzschm...
SIGIR
2004
ACM
15 years 10 months ago
Context-based question-answering evaluation
In this poster, we will present the results of efforts we have undertaken to conduct evaluations of a QA system in a real world environment and to understand the nature of the dim...
Elizabeth D. Liddy, Anne Diekema, Ozgur Yilmazel
GD
2004
Springer
15 years 10 months ago
The Metro Map Layout Problem
We initiate a new problem of automatic metro map layout. In general, a metro map consists of a set of lines which have intersections or overlaps. We define a set of aesthetic crit...
Seok-Hee Hong, Damian Merrick, Hugo A. D. do Nasci...
GI
2004
Springer
15 years 10 months ago
Consistent Context Management in Mobile Ad Hoc Networks
: John entered his office. John left his office. The order of these updates to a context-aware system is important to reflect the state in the real world. Context information ob...
Jörg Hähner, Christian Becker, Pedro Jos...