Sciweavers

786 search results - page 133 / 158
» Task Representation and Retrieval in an Ontology-Guided Mode...
Sort
View
SAC
2004
ACM
15 years 3 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
PG
1997
IEEE
15 years 1 months ago
Real-time virtual humans
The last few years have seen great maturationin the computation speed and control methods needed to portray 3D virtualhumanssuitableforreal interactiveapplications. We first desc...
Norman I. Badler
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
15 years 10 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
FLAIRS
2003
14 years 11 months ago
Topic Extraction and Extension to Support Concept Mapping
Successful knowledge management may depend not only on knowledge capture, but on knowledge construction—on formulating new and useful knowledge that was not previously available...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
SAC
2004
ACM
15 years 3 months ago
Concatenate feature extraction for robust 3D elliptic object localization
Developing an efficient object localization system for complicated industrial objects is an important, yet difficult robotic task. To tackle this problem, we have developed a syst...
Yuichi Motai, Akio Kosaka