Sciweavers

2846 search results - page 188 / 570
» Real World Teleconferencing
Sort
View
ISI
2005
Springer
14 years 2 months ago
Data Distortion for Privacy Protection in a Terrorist Analysis System
Data distortion is a critical component to preserve privacy in security-related data mining applications, such as in data miningbased terrorist analysis systems. We propose a spars...
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang
MIRRORBOT
2005
Springer
139views Robotics» more  MIRRORBOT 2005»
14 years 2 months ago
Neural Robot Detection in RoboCup
Abstract. Improving the game play in RoboCup middle size league requires a fast and robust visual robot detection system. The presented multilevel approach documents, that the comb...
Gerd Mayer, Ulrich Kaufmann, Gerhard K. Kraetzschm...
SIGIR
2004
ACM
14 years 2 months ago
Context-based question-answering evaluation
In this poster, we will present the results of efforts we have undertaken to conduct evaluations of a QA system in a real world environment and to understand the nature of the dim...
Elizabeth D. Liddy, Anne Diekema, Ozgur Yilmazel
GD
2004
Springer
14 years 2 months ago
The Metro Map Layout Problem
We initiate a new problem of automatic metro map layout. In general, a metro map consists of a set of lines which have intersections or overlaps. We define a set of aesthetic crit...
Seok-Hee Hong, Damian Merrick, Hugo A. D. do Nasci...
GI
2004
Springer
14 years 2 months ago
Consistent Context Management in Mobile Ad Hoc Networks
: John entered his office. John left his office. The order of these updates to a context-aware system is important to reflect the state in the real world. Context information ob...
Jörg Hähner, Christian Becker, Pedro Jos...