Sciweavers

4266 search results - page 292 / 854
» The container loading problem
Sort
View
AUSDM
2007
Springer
161views Data Mining» more  AUSDM 2007»
15 years 11 months ago
A Case Study of Failure Mode Analysis with Text Mining Methods
The maintenance dataset provided by SunWater contains information about failed assets also known as components and their corresponding failure modes. Currently, extraction of this...
Lin Chen, Richi Nayak
MLG
2007
Springer
15 years 11 months ago
Support Computation for Mining Frequent Subgraphs in a Single Graph
—Defining the support (or frequency) of a subgraph is trivial when a database of graphs is given: it is simply the number of graphs in the database that contain the subgraph. Ho...
Mathias Fiedler, Christian Borgelt
IPPS
2006
IEEE
15 years 10 months ago
Towards an analysis of race carrier conditions in real-time Java
The RTSJ memory model propose a mechanism based on a scope three containing all region-stacks in the system and a reference-counter collector. In order to avoid reference cycles a...
M. Teresa Higuera-Toledano
IROS
2006
IEEE
144views Robotics» more  IROS 2006»
15 years 10 months ago
Visual Servo Velocity and Pose Control of a Wheeled Inverted Pendulum through Partial-Feedback Linearization
— Vision-based control of wheeled vehicles is a difficult problem due to nonholonomic constraints on velocities. This is further complicated in the control of vehicles with drif...
Nicholas R. Gans, Seth Hutchinson
ICNP
2005
IEEE
15 years 10 months ago
A Family of Collusion Resistant Protocols for Instantiating Security
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and t...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar