Sciweavers

6693 search results - page 1226 / 1339
» Methods of Automatic Algorithm Generation
Sort
View
ECML
2005
Springer
15 years 3 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
ICICS
2005
Springer
15 years 3 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
MM
2004
ACM
118views Multimedia» more  MM 2004»
15 years 3 months ago
Scene tunnels for seamless virtual tour
This paper proposes a visual representation named scene tunnel to archive and visualize urban scenes for Internet based virtual tour. We scan cityscapes using multiple cameras on ...
Jiang Yu Zheng, Yu Zhou
SAC
2004
ACM
15 years 3 months ago
Propositional planning in BDI agents
This paper aims to describe the relationship between propositional planning systems and the process of means-end reasoning used by BDI agents. To show such relationship, we defin...
Felipe Rech Meneguzzi, Avelino F. Zorzo, Michael d...
VRST
2004
ACM
15 years 3 months ago
Occlusion handling for medical augmented reality using a volumetric phantom model
The support of surgical interventions has long been in the focus of application-oriented augmented reality research. Modern methods of surgery, like minimally-invasive procedures,...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
« Prev « First page 1226 / 1339 Last » Next »