Sciweavers

4650 search results - page 740 / 930
» Generating and evaluating evaluative arguments
Sort
View
CG
2006
Springer
15 years 1 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
CSDA
2006
102views more  CSDA 2006»
15 years 1 months ago
An improved Akaike information criterion for state-space model selection
Following the work of Hurvich, Shumway, and Tsai (1990), we propose an "improved" variant of the Akaike information criterion, AICi, for state-space model selection. The...
Thomas Bengtsson, Joseph E. Cavanaugh
125
Voted
DPD
2006
123views more  DPD 2006»
15 years 1 months ago
Reducing network traffic in unstructured P2P systems using Top-k queries
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solu...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
111
Voted
IJAMC
2008
85views more  IJAMC 2008»
15 years 1 months ago
Scalable reputation management with trustworthy user selection for P2P MMOGs
: Recent research on Peer-to-Peer Massively Multiplayer Online Games (P2P MMOGs) has tried to find more scalable and affordable solutions to build virtual environments via the reso...
Guan-Yu Huang, Shun-Yun Hu, Jehn-Ruey Jiang
ESWA
2006
243views more  ESWA 2006»
15 years 1 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer