Sciweavers

1928 search results - page 288 / 386
» Integrity Constraints in OWL
Sort
View
ICDM
2009
IEEE
117views Data Mining» more  ICDM 2009»
14 years 4 months ago
Redistricting Using Heuristic-Based Polygonal Clustering
— Redistricting is the process of dividing a geographic area into districts or zones. This process has been considered in the past as a problem that is computationally too comple...
Deepti Joshi, Leen-Kiat Soh, Ashok Samal
ICRA
2009
IEEE
145views Robotics» more  ICRA 2009»
14 years 4 months ago
A two-steps next-best-view algorithm for autonomous 3D object modeling by a humanoid robot
— A novel approach is presented which aims at building autonomously visual models of unknown objects, using a humanoid robot. Although good methods have been proposed for the spe...
Torea Foissotte, Olivier Stasse, Adrien Escande, P...
IEEECIT
2009
IEEE
14 years 4 months ago
SLA-Aware Virtual Resource Management for Cloud Infrastructures
Cloud platforms host several independent applications on a shared resource pool with the ability to allocate computing power to applications on a per-demand basis. The use of serv...
Hien Nguyen Van, Frédéric Dang Tran,...
ATAL
2009
Springer
14 years 4 months ago
Maintenance-based trust for multi-agent systems
In last years, trust and reputation has been gaining increasing interest in multi-agent systems (MAS). To address this issue, we propose in this paper a maintenance-based trust me...
Babak Khosravifar, Maziar Gomrokchi, Jamal Bentaha...
NOSSDAV
2009
Springer
14 years 4 months ago
Cross-tree adjustment for spatialized audio streaming over networked virtual environments
In recent years, integrated spatialized voice services have become an appealing application for networked virtual environments (NVE), e.g., Second Life. With a spatialized voice s...
Ke Liang, Roger Zimmermann