Sciweavers

1019 search results - page 132 / 204
» Referent Tracking and its Applications
Sort
View
JMM
2007
107views more  JMM 2007»
13 years 10 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner
SAC
2008
ACM
13 years 9 months ago
Decision-making coordination in collaborative product configuration
In Software Product Lines (SPLs), product configuration is a decision-making process in which a group of stakeholders choose features for a product. Unfortunately, current configu...
Marcílio Mendonça, Thiago T. Bartolo...
DLOG
2010
13 years 8 months ago
The Logical Difference For Fuzzy EL+ Ontologies
Abstract. Ontologies undergo changes for reasons such as changes in knowledge, meeting varying application requirements. Thus, for different versions of a considered ontology, it i...
Shasha Feng, Yonggang Zhang, Dantong Ouyang, Haiya...
WWW
2011
ACM
13 years 5 months ago
EntityTagger: automatically tagging entities with descriptive phrases
We consider the problem of entity tagging: given one or more named entities from a specific domain, the goal is to automatically associate descriptive phrases, referred to as eta...
Kaushik Chakrabarti, Surajit Chaudhuri, Tao Cheng,...
WH
2010
170views Healthcare» more  WH 2010»
13 years 4 months ago
Towards power optimized kalman filter for gait assessment using wearable sensors
Systems with wearable and wireless motion sensors have been receiving significant attention in the past few years specifically for the applications of human movement monitoring. O...
Prem Santosh Udaya Shankar, Nikhil Raveendranathan...