Results 81 to 90 of about 10,850,903 (220)

AntiGPS spoofing method for UAV based on LSTM-KF model

open access: yes网络与信息安全学报, 2020
A detection method of anti GPS deception of UAV was proposed for the problem that GPS signal of UAV was easy to be interfered and deceived, which combined deep learning and Kalman filter.
SUN Yang, CAO Chunjie   +1 more
doaj   +1 more source

Abductive retrieval for multimedia information seeking [PDF]

open access: yes, 2003
In this paper we discuss an approach to the retrieval of data annotated using the MPEG-7 multimedia description schema. In particular we describe a framework for the retrieval of annotated video samples that is based on principles from the area of ...
Lalmas, Mounia   +2 more
core   +2 more sources

Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users

open access: yesApplied Sciences
Reinforcement learning is a machine learning framework that relies on a lot of trial-and-error processes to learn the best policy to maximize the cumulative reward through the interaction between the agent and the environment.
Bangyan Chen, Jun Ye
doaj   +1 more source

Towards an Information Retrieval Theory of Everything [PDF]

open access: yes, 2009
I present three well-known probabilistic models of information retrieval in tutorial style: The binary independence probabilistic model, the language modeling approach, and Google's page rank.
Hiemstra, Djoerd
core   +2 more sources

Software Support for Discourse-Based Textual Information Analysis: A Systematic Literature Review and Software Guidelines in Practice

open access: yesInformation, 2020
The intrinsic characteristics of humanities research require technological support and software assistance that also necessarily goes through the analysis of textual narratives. When these narratives become increasingly complex, pragmatics analysis (i.e.,
Patricia Martin-Rodilla, Miguel Sánchez
doaj   +1 more source

Responding to Retrieval: A Proposal to Use Retrieval Information for Better Presentation of Website Content

open access: yes, 2015
Retrieval and content management are assumed to be mutually exclusive. In this paper we suggest that they need not be so. In the usual information retrieval scenario, some information about queries leading to a website (due to `hits' or `visits') is ...
Chowdary, C Ravindranath   +2 more
core   +1 more source

Retrieval cues fail to influence contextualized evaluations. [PDF]

open access: yes, 2020
Initial evaluations generalise to new contexts, whereas counter-attitudinal evaluations are context-specific. Counter-attitudinal information may not change evaluations in new contexts because perceivers fail to retrieve counter-attitudinal cue ...
Calanchini, Jimmy   +6 more
core  

Routing Protocol for Underwater Wireless Sensor Networks Based on a Trust Model and Void-Avoided Algorithm

open access: yesSensors
Underwater wireless sensor networks have a wide range of application prospects in important fields such as ocean exploration and underwater environment monitoring. However, the influence of complex underwater environments makes underwater wireless sensor
Jun Ye, Weili Jiang
doaj   +1 more source

XPIR : Private Information Retrieval for Everyone

open access: yesProceedings on Privacy Enhancing Technologies, 2016
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators.
C. A. Melchor   +3 more
semanticscholar   +1 more source

Content or context? Searching for musical meaning in task-based interactive information retrieval [PDF]

open access: yes, 2008
Creative professionals search for digital music to accompany moving images using interactive information retrieval systems run by music publishers and record companies.
Inskip, C., MacFarlane, A., Rafferty, P.
core  

Home - About - Disclaimer - Privacy