Sciweavers

2851 search results - page 355 / 571
» A Knowledge Based Approach on Educational Metadata Use
Sort
View
SAB
2004
Springer
159views Optimization» more  SAB 2004»
15 years 9 months ago
Swarming Behavior Using Probabilistic Roadmap Techniques
While techniques exist for simulating swarming behaviors, these methods usually provide only simplistic navigation and planning capabilities. In this review, we explore the benefi...
O. Burçhan Bayazit, Jyh-Ming Lien, Nancy M....
TNC
2004
120views Education» more  TNC 2004»
15 years 5 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
ECAI
2008
Springer
15 years 6 months ago
Using Natural Language Generation Technology to Improve Information Flows in Intensive Care Units
In the drive to improve patient safety, patients in modern intensive care units are closely monitored with the generation of very large volumes of data. Unless the data are further...
Jim Hunter, Albert Gatt, François Portet, E...
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
15 years 10 months ago
A Survey on Disk Oriented Querying and Reasoning on the Semantic Web
This paper presents a description of seven systems, which use database technology to both represent knowledge persistently and make scalable queries on it, in the Semantic Web con...
María del Mar Roldán García, ...
IPPS
1998
IEEE
15 years 8 months ago
Prioritized Token-Based Mutual Exclusion for Distributed Systems
A number of solutions have been proposed for the problem of mutual exclusion in distributed systems. Some of these approaches have since been extended to a prioritized environment...
Frank Mueller