Sciweavers

26354 search results - page 5083 / 5271
» How we refactor, and how we know it
Sort
View
ATAL
2004
Springer
15 years 7 months ago
Toward Trustworthy Adjustable Autonomy in KAoS
Trust is arguably the most crucial aspect of agent acceptability. At its simplest level, it can be characterized in terms of judgments that people make concerning three factors: an...
Jeffrey M. Bradshaw, Hyuckchul Jung, Shriniwas Kul...
135
Voted
CIKM
2004
Springer
15 years 7 months ago
RStar: an RDF storage and query system for enterprise resource management
Modern corporations operate in an extremely complex environment and strongly depend on all kinds of information resources across the enterprise. Unfortunately, with the growth of ...
Li Ma, Zhong Su, Yue Pan, Li Zhang, Tao Liu
EKAW
2004
Springer
15 years 7 months ago
ConEditor: Tool to Input and Maintain Constraints
We present a tool which helps domain experts capture and maintain constraints. The tool displays parts of an ontology (as classes, sub-classes and properties) in the form of a tree...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
ICIAR
2004
Springer
15 years 7 months ago
Neuro-Fuzzy Method for Automated Defect Detection in Aluminium Castings
The automated flaw detection in aluminium castings consists of two steps: a) identification of potential defects using image processing techniques, and b) classification of pote...
Sergio Hernández, Doris Saez, Domingo Mery
ISI
2004
Springer
15 years 7 months ago
SECRETS: A Secure Real-Time Multimedia Surveillance System
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...
Naren Kodali, Csilla Farkas, Duminda Wijesekera
« Prev « First page 5083 / 5271 Last » Next »