Sciweavers

1740 search results - page 296 / 348
» A Digital Archive of Research Papers in Computer Science
Sort
View
CSE
2009
IEEE
15 years 8 months ago
Implementing Social Norms Using Policies
—Multi-agent systems are difficult to develop. One reason for this is that agents are embedded in a society where all agents must agree to obey certain social norms in order for...
Robert Kremer
CSIE
2009
IEEE
15 years 8 months ago
Integration of a Concept Map Generator and a Knowledge-Portal-Based E-learning System
Knowledge management (KM) is the research field aimed to create, organize, and store explicit knowledge for easy access and manipulation, whereas e-learning is concerned with del...
Jyh-Da Wei, Tai-Yu Chen, Tsai-Yeh Tung, D. T. Lee
ACMSE
2009
ACM
15 years 8 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
FOCS
2007
IEEE
15 years 7 months ago
Maximizing Non-Monotone Submodular Functions
Submodular maximization generalizes many important problems including Max Cut in directed/undirected graphs and hypergraphs, certain constraint satisfaction problems and maximum f...
Uriel Feige, Vahab S. Mirrokni, Jan Vondrák
ACSC
2006
IEEE
15 years 7 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi