Sciweavers

712 search results - page 88 / 143
» The Complexity of Constructing Evolutionary Trees Using Expe...
Sort
View
JAIR
2010
145views more  JAIR 2010»
15 years 1 months ago
Planning with Noisy Probabilistic Relational Rules
Noisy probabilistic relational rules are a promising world model representation for several reasons. They are compact and generalize over world instantiations. They are usually in...
Tobias Lang, Marc Toussaint
ICIP
2004
IEEE
16 years 4 months ago
Wavelet-based contourlet transform and its application to image coding
In this paper, we first propose a new family of geometrical image transforms that decompose images both radially and angularly. Our construction comprises two stages of filter ban...
Ramin Eslami, Hayder Radha
DATAMINE
2002
125views more  DATAMINE 2002»
15 years 2 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
IROS
2006
IEEE
123views Robotics» more  IROS 2006»
15 years 9 months ago
Robot Navigation based on the Mapping of Coarse Qualitative Route Descriptions to Route Graphs
— This paper describes the use of natural language route descriptions in the mobile robot navigation domain. Guided by corpus analysis and earlier work on coarse qualitative rout...
Christian Mandel, Udo Frese, Thomas Röfer
CMS
2006
175views Communications» more  CMS 2006»
15 years 4 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin