Recognizing commonly used data structures and algorithms is a key activity in reverse engineering. Systems developed to automate this recognition process have been isolated, stand...
Procurement is one of the major activities in the Manufacturing Resource Planning (MRP II), which is closely coupled with inventory management. Any improvement in this area will h...
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Directions search returns the shortest path from a source to a destination on a road network. However, the search interests of users may be exposed to the service providers, thus r...
Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Baih...
This demonstration shows an integrated query processing environment where users can seamlessly query both a data stream management system and a sensor network with one query expre...
Daniel J. Abadi, Wolfgang Lindner, Samuel Madden, ...