The generation of a set of rules underlying a classification problem is performed by applying a new algorithm, called Hamming Clustering (HC). It reconstructs the and-or expressio...
— In this paper we show that visual landmark generation and redetection is possible with a single feature per frame. The approach is based on the assumption that highly discrimin...
Critical software most often requires an independent validation and verification (IVV). IVV is usually performed by domain experts, who are not familiar with specific, many times ...
This paper presents a methodology based on a variation of the Quintic Pythagorean Hodographs curves for generating smooth feasible paths for autonomous vehicles in three-dimensiona...
Armando Alves Neto, Mario Fernando Montenegro Camp...
Abstract. The effective construction of many association rule bases requires the computation of both frequent closed and frequent generator itemsets (FCIs/FGs). However, only few m...