Sciweavers

213 search results - page 35 / 43
» Refining Information Extraction Rules using Data Provenance
Sort
View
115
Voted
IMR
2004
Springer
15 years 5 months ago
Reliable Isotropic Tetrahedral Mesh Generation Based on an Advancing Front Method
In this paper, we propose a robust isotropic tetrahedral mesh generation method. An advancing front method is employed to control local mesh density and to easily preserve the ori...
Yasushi Ito, Alan M. Shih, Bharat K. Soni
83
Voted
ICRA
2002
IEEE
142views Robotics» more  ICRA 2002»
15 years 4 months ago
Hybrid Simultaneous Localization and Map Building: Closing the Loop with Multi-Hypotheses Tracking
In this paper simultaneous localization and map building is performed with a hybrid, metric - topological, approach. A global topological map connects local metric maps, allowing ...
Nicola Tomatis, Illah R. Nourbakhsh, Roland Siegwa...
AINA
2007
IEEE
15 years 6 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
89
Voted
MABS
2004
Springer
15 years 5 months ago
Formal Analysis of Meeting Protocols
Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and mak...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur, ...
SIGGRAPH
2010
ACM
15 years 4 months ago
A connection between partial symmetry and inverse procedural modeling
In this paper, we address the problem of inverse procedural modeling: Given a piece of exemplar 3D geometry, we would like to find a set of rules that describe objects that are s...
Martin Bokeloh, Michael Wand, Hans-Peter Seidel