Sciweavers

1154 search results - page 179 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
TIT
1998
121views more  TIT 1998»
13 years 7 months ago
Blind Multiuser Detection: A Subspace Approach
—A new multiuser detection scheme based on signal subspace estimation is proposed. It is shown that under this scheme, both the decorrelating detector and the linear minimummean-...
Xiaodong Wang, H. Vincent Poor
TMI
1998
128views more  TMI 1998»
13 years 7 months ago
Fully Automatic Segmentation of the Brain in MRI
— A robust fully automatic method for segmenting the brain from head magnetic resonance (MR) images has been developed, which works even in the presence of radio frequency (RF) i...
M. Stella Atkins, Blair T. Mackiewich
IPM
2010
133views more  IPM 2010»
13 years 6 months ago
A concept-relationship acquisition and inference approach for hierarchical taxonomy construction from tags
Taxonomy construction is a resource-demanding, top down, and time consuming effort. It does not always cater for the prevailing context of the captured information. This paper pro...
Eric Tsui, W. M. Wang, Chi Fai Cheung, Adela S. M....
JUCS
2010
116views more  JUCS 2010»
13 years 6 months ago
Content Recommendation in APOSDLE using the Associative Network
: One of the success factors of Work Integrated Learning (WIL) is to provide the appropriate content to the users, both suitable for the topics they are currently working on, and t...
Hermann Stern, Rene Kaiser, Philip Hofmair, Peter ...
KI
2010
Springer
13 years 6 months ago
Positions, Regions, and Clusters: Strata of Granularity in Location Modelling
Location models are data structures or knowledge bases used in Ubiquitous Computing for representing and reasoning about spatial relationships between so-called smart objects, i.e....
Hedda Rahel Schmidtke, Michael Beigl