Sciweavers

1016 search results - page 77 / 204
» Explore or Exploit
Sort
View
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Length of the Product Generation Life Cycle as a Moderator of Innovation Strategy: A Comparative Cross-Industry Study of Ten
This paper aims at exploring the role of the product generation life cycle (PGLC) on differences in innovation strategy among industries in a crossindustry study of ten multinatio...
Frances T. J. M. Fortuin, S. W. F. Omta
PKDD
2007
Springer
114views Data Mining» more  PKDD 2007»
14 years 3 months ago
Robust Visual Mining of Data with Error Information
Abstract. Recent results on robust density-based clustering have indicated that the uncertainty associated with the actual measurements can be exploited to locate objects that are ...
Jianyong Sun, Ata Kabán, Somak Raychaudhury
ICRA
2005
IEEE
135views Robotics» more  ICRA 2005»
14 years 2 months ago
Sampling-Based Motion Planning Using Predictive Models
— Robotic motion planning requires configuration space exploration. In high-dimensional configuration spaces, a complete exploration is computationally intractable. Practical m...
Brendan Burns, Oliver Brock
CIKM
2005
Springer
14 years 2 months ago
Evaluation of a MCA-based approach to organize data cubes
On Line Analysis Processing (OLAP) is a technology basically created to provide users with tools in order to explore and navigate into data cubes. Unfortunately, in huge and spars...
Riadh Ben Messaoud, Omar Boussaid, Sabine Rabas&ea...
CHARME
2001
Springer
98views Hardware» more  CHARME 2001»
14 years 1 months ago
Hardware Synthesis Using SAFL and Application to Processor Design
Abstract. We survey the work done so far in the FLaSH project (Functional Languages for Synthesising Hardware) in which the core ideas are (i) using a functional language SAFL to d...
Alan Mycroft, Richard Sharp