Sciweavers

313 search results - page 47 / 63
» Using Recon for Data Cleaning
Sort
View
WWW
2005
ACM
14 years 8 months ago
The volume and evolution of web page templates
Web pages contain a combination of unique content and template material, which is present across multiple pages and used primarily for formatting, navigation, and branding. We stu...
David Gibson, Kunal Punera, Andrew Tomkins
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
14 years 2 months ago
Imitation learning with generalized task descriptions
— In this paper, we present an approach that allows a robot to observe, generalize, and reproduce tasks observed from multiple demonstrations. Motion capture data is recorded in ...
Clemens Eppner, Jürgen Sturm, Maren Bennewitz...
SMA
2009
ACM
228views Solid Modeling» more  SMA 2009»
14 years 2 months ago
Robust mesh reconstruction from unoriented noisy points
We present a robust method to generate mesh surfaces from unoriented noisy points in this paper. The whole procedure consists of three steps. Firstly, the normal vectors at points...
Hoi Sheung, Charlie C. L. Wang
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
14 years 1 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
14 years 13 days ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan