Sciweavers

4429 search results - page 874 / 886
» An Algorithm for Knowledge Base Extraction
Sort
View
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
14 years 12 days ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 2 days ago
Improving data mining utility with projective sampling
Overall performance of the data mining process depends not just on the value of the induced knowledge but also on various costs of the process itself such as the cost of acquiring...
Mark Last
WASA
2009
Springer
103views Algorithms» more  WASA 2009»
14 years 1 days ago
Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks
Mobile underwater sensor networks are usually featured with three-dimensional topology, high node mobility and long propagation delays. For such networks, geographic routing has be...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
AGENTS
1998
Springer
13 years 11 months ago
A Hybrid Procedural/Deductive Executive for Autonomous Spacecraft
The New Millennium Remote Agent NMRA will be the rst AI system to control an actual spacecraft. The spacecraft domain places a strong premium on autonomy and requires dynamic reco...
Barney Pell, Edward B. Gamble, Erann Gat, Ron Kees...
AGENTS
1997
Springer
13 years 11 months ago
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent
We have been developing Rogue, an architecture that integrates high-level planning with a low-level executing robotic agent. Rogue is designed as the oce gofer task planner for X...
Karen Zita Haigh, Manuela M. Veloso