Sciweavers

3773 search results - page 658 / 755
» Using Ontologies for Integrated Geographic Information Syste...
Sort
View
EWCBR
2008
Springer
15 years 6 months ago
Conversational Case-Based Recommendations Exploiting a Structured Case Model
There are case-based recommender systems that generate personalized recommendations for users exploiting the knowledge contained in past recommendation cases. These systems assume ...
Quang Nhat Nguyen, Francesco Ricci
TCS
2008
15 years 4 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
TFS
2008
174views more  TFS 2008»
15 years 4 months ago
Type-2 Fuzzy Markov Random Fields and Their Application to Handwritten Chinese Character Recognition
In this paper, we integrate type-2 (T2) fuzzy sets with Markov random fields (MRFs) referred to as T2 FMRFs, which may handle both fuzziness and randomness in the structural patter...
Jia Zeng, Zhi-Qiang Liu
ICVS
2009
Springer
15 years 2 months ago
Boosting with a Joint Feature Pool from Different Sensors
This paper introduces a new way to apply boosting to a joint feature pool from different sensors, namely 3D range data and color vision. The combination of sensors strengthens the ...
Dominik Alexander Klein, Dirk Schulz, Simone Frint...
SCS
2004
15 years 5 months ago
HazLog: Tool Support for Hazard Management
Industry is increasingly adopting software and system safety standards that mandate the use of hazard logs in the development and operation of safety critical systems. Hazard logs...
Christian Hamoy, David Hemer, Peter A. Lindsay