Sciweavers

1821 search results - page 242 / 365
» Security-Aware Program Transformations
Sort
View
PKDD
2000
Springer
120views Data Mining» more  PKDD 2000»
14 years 1 months ago
Multi-Relational Data Mining, Using UML for ILP
Although there is a growing need for multi-relational data mining solutions in KDD, the use of obvious candidates from the field of Inductive Logic Programming (ILP) has been limit...
Arno J. Knobbe, Arno Siebes, Hendrik Blockeel, Dan...
ISTA
2003
13 years 11 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko
VMV
2003
203views Visualization» more  VMV 2003»
13 years 11 months ago
Semantic Scene Analysis of Scanned 3D Indoor Environments
Precise digital 3D models of indoor environments are needed in several applications, e.g., facility management, architecture, rescue and inspection robotics. This paper presents a...
Andreas Nüchter, Hartmut Surmann, Kai Lingema...
AAAI
1990
13 years 11 months ago
Operationality Criteria for Recursive Predicates
Current explanation-based generalization (EBG) techniques can perform badly when the problem being solved involves recursion. Often an infinite series of learned concepts are gene...
Stanley Letovsky
AAAI
1990
13 years 11 months ago
Finding the Average Rates of Change in Repetitive Behavior
The repetitive behavior of a device or system can be described in two ways: a detailed description of one iteration of the behavior, or a summary description of the behavior over ...
Alexander S. Yeh