Sciweavers

6906 search results - page 1218 / 1382
» An algorithm for modelling key terms
Sort
View
ICMI
2005
Springer
113views Biometrics» more  ICMI 2005»
15 years 3 months ago
Automatic detection of interaction groups
This paper addresses the problem of detecting interaction groups in an intelligent environment. To understand human activity, we need to identify human actors and their interperso...
Oliver Brdiczka, Jérôme Maisonnasse, ...
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
15 years 3 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
NOSSDAV
2005
Springer
15 years 3 months ago
A formal approach to design optimized multimedia service overlay
Service overlay networks have recently attracted tremendous interests. In this paper, we propose a new integrated framework for specifying services composed of service components ...
Hirozumi Yamaguchi, Khaled El-Fakih, Akihito Hirom...
PPDP
2005
Springer
15 years 3 months ago
Trace effects and object orientation
fects are statically generated program abstractions, that can be model checked for verification of assertions in a temporal program logic. In this paper we develop a type and eff...
Christian Skalka
ACMSE
2004
ACM
15 years 3 months ago
Distributed robotic target acquisition using Bluetooth communication
This paper presents a distributed multi-robot system designed to solve a team-based search and destroy task. The project was divided into two phases. The initial phase was used to...
J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, ...
« Prev « First page 1218 / 1382 Last » Next »