The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
In this paper, we present a learning approach to the scenario template task of information extraction, where information filling one template could come from multiple sentences. ...
The thematic and citation structures of Data and Knowledge Engineering (DKE) (1985-2007) are identified based on text analysis and citation analysis of the bibliographic records o...
—This paper reveals weaknesses of existing e-learning system and puts forward a novel architecture of five layers from the perspective of knowledge innovation. Learner interface ...
One of the original motivations for research in qualitative physics was the development of intelligent tutoring systems and learning environments for physical domains and complex ...