Sciweavers

2421 search results - page 323 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICRA
2009
IEEE
163views Robotics» more  ICRA 2009»
15 years 11 months ago
On fast surface reconstruction methods for large and noisy point clouds
— In this paper we present a method for fast surface reconstruction from large noisy datasets. Given an unorganized 3D point cloud, our algorithm recreates the underlying surface...
Zoltan Csaba Marton, Radu Bogdan Rusu, Michael Bee...
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
15 years 11 months ago
Learning What Makes a Society Tick
We present a machine learning methodology (models, algorithms, and experimental data) to discovering the agent dynamics that drive the evolution of the social groups in a communit...
Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Is...
IEEEPACT
2006
IEEE
15 years 11 months ago
A two-phase escape analysis for parallel java programs
Thread escape analysis conservatively determines which objects may be accessed in more than one thread. Thread escape analysis is useful for a variety of purposes – finding rac...
Kyungwoo Lee, Samuel P. Midkiff
SEMWEB
2005
Springer
15 years 10 months ago
Combining RDF and Part of OWL with Rules: Semantics, Decidability, Complexity
This paper extends the model theory of RDF with rules, placing an emphasis on integration with OWL and decidability of entailstart from an abstract syntax that views a rule as a pa...
Herman J. ter Horst
ICCAD
1998
IEEE
120views Hardware» more  ICCAD 1998»
15 years 9 months ago
Communication synthesis for distributed embedded systems
Designers of distributed embedded systems face many challenges in determining the appropriate tradeoffs to make when defining a system architecture or retargeting an existing desi...
Ross B. Ortega, Gaetano Borriello