Sciweavers

1200 search results - page 76 / 240
» Marked Ancestor Problems
Sort
View
109
Voted
COMPGEOM
2007
ACM
15 years 4 months ago
Medial axis approximation from inner Voronoi balls: a demo of the Mesecina tool
We illustrate a simple algorithm for approximating the medial axis of a 2D shape with smooth boundary from a sample of this boundary. The algorithm is compared to a more general a...
Balint Miklos, Joachim Giesen, Mark Pauly
114
Voted
CONCUR
2009
Springer
15 years 4 months ago
Weak Time Petri Nets Strike Back!
We consider the model of Time Petri Nets where time is associated with transitions. Two semantics for time elapsing can be considered: the strong one, for which all transitions are...
Pierre-Alain Reynier, Arnaud Sangnier
90
Voted
CEAS
2006
Springer
15 years 4 months ago
"Sorry, I Forgot the Attachment": Email Attachment Prediction
The missing attachment problem: a missing attachment generates a wave of emails from the recipients notifying the sender of the error. We present an attachment prediction system t...
Mark Dredze, John Blitzer, Fernando Pereira
90
Voted
ILP
2000
Springer
15 years 4 months ago
Using ILP to Improve Planning in Hierarchical Reinforcement Learning
Hierarchical reinforcement learning has been proposed as a solution to the problem of scaling up reinforcement learning. The RLTOPs Hierarchical Reinforcement Learning System is an...
Mark D. Reid, Malcolm R. K. Ryan
99
Voted
ER
1995
Springer
109views Database» more  ER 1995»
15 years 4 months ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers