Sciweavers

303 search results - page 44 / 61
» Unifying Theories of Confidentiality
Sort
View
ICMCS
2006
IEEE
167views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Efficient Object Tracking using Control-Based Observer Design
Kernel-based tracking approaches have proven to be more efficient in computation compared to other tracking approaches such as particle filtering. However, existing kernel-based...
Wei Qu, Dan Schonfeld
IROS
2006
IEEE
168views Robotics» more  IROS 2006»
14 years 3 months ago
An Entropy-Based Measurement of Certainty in Rao-Blackwellized Particle Filter Mapping
– In Bayesian based approaches to mobile robot simultaneous localization and mapping, Rao-Blackwellized particle filters (RBPF) enable the efficient estimation of the posterior b...
Jose-Luis Blanco, Juan-Antonio Fernandez-Madrigal,...
IWCMC
2006
ACM
14 years 3 months ago
Dynamic and automatic connection of personal area networks to the global internet
In the Next Generation Networks (NGNs) users will carry multiple devices forming cooperative networks known as Personal Area Networks (PANs). Some existing technologies enable thi...
Rui Campos, Manuel Ricardo
ICTAI
2005
IEEE
14 years 3 months ago
ACE: An Aggressive Classifier Ensemble with Error Detection, Correction, and Cleansing
Learning from noisy data is a challenging and reality issue for real-world data mining applications. Common practices include data cleansing, error detection and classifier ensemb...
Yan Zhang, Xingquan Zhu, Xindong Wu, Jeffrey P. Bo...
OOPSLA
2005
Springer
14 years 3 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards