Sciweavers

2421 search results - page 47 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
IPPS
2003
IEEE
14 years 4 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
14 years 5 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
IDEAL
2010
Springer
13 years 9 months ago
Applying Clustering Techniques to Reduce Complexity in Automated Planning Domains
Automated Planning is a very active area of research within Artificial Intelligence. Broadly this discipline deals with the methods by which an agent can independently determine t...
Luke Dicken, John Levine
CASCON
1996
109views Education» more  CASCON 1996»
14 years 10 days ago
A system for the seamless integration of personal messages using agents developed on a lotus notes platform
We introduce a seamless messaging system for the management of personal messages. The aim of it is to intercept, filter, interpret, and deliver multi-modal messages (voice, fax, a...
Ramiro Liscano, Roger Impey, Paul Gordon, Suhayya ...
PPDP
1999
Springer
14 years 3 months ago
Localizing and Explaining Reasons for Non-terminating Logic Programs with Failure-Slices
We present a slicing approach for analyzing logic programs with respect to non-termination. The notion of a failure-slice is presented which is an executable reduced fragment of th...
Ulrich Neumerkel, Frédéric Mesnard