scispace - formally typeset
A

Aitor Santamaría-Ibirika

Researcher at University of Deusto

Publications -  7
Citations -  96

Aitor Santamaría-Ibirika is an academic researcher from University of Deusto. The author has contributed to research in topics: Terrain & The Internet. The author has an hindex of 5, co-authored 7 publications receiving 82 citations.

Papers
More filters
Book ChapterDOI

Twitter Content-Based Spam Filtering

TL;DR: This paper has used the text in the tweet and machine learning and compression algorithms to filter those undesired tweets and proposes a content-based approach to filter spam tweets.
Journal ArticleDOI

Procedural approach to volumetric terrain generation

TL;DR: This paper proposes a new approach to procedural volumetric terrains that generates completely customizable volumetry terrains with layered materials and other features, and uses a specific representation for the terrain based on stacked material structures, reducing memory requirements.
Proceedings ArticleDOI

Machine-learning-based surface defect detection and categorisation in high-precision foundry

TL;DR: In this article, the authors propose a new approach that detects imperfections on the surface using a segmentation method that marks the regions of the casting that may be affected by some of these defects and applies machine-learning techniques to classify the regions in correct or in the different types of faults.
Proceedings ArticleDOI

Procedural Playable Cave Systems Based on Voronoi Diagram and Delaunay Triangulation

TL;DR: This paper proposes a new method to generate playable cave systems for 2D and 3D volumetric terrains, based on Voronoi diagrams and Delaunay triangulations, which is completely customizable by the designer by a set of parameters directly related to the cave itself avoiding technical concepts.
Book ChapterDOI

Adult Content Filtering through Compression-Based Text Classification

TL;DR: This paper presents the first adult content filtering tool that employs compression algorithms to represent data that is resilient to different attacks and shows that this approach enhances the results of classic VSM models.