Sciweavers

828 search results - page 143 / 166
» A framework for spyware assessment
Sort
View
ICMLA
2004
15 years 3 months ago
Mining interesting contrast rules for a web-based educational system
Web-based educational technologies allow educators to study how students learn (descriptive studies) and which learning strategies are most effective (causal/predictive studies). ...
Behrouz Minaei-Bidgoli, Pang-Ning Tan, William F. ...
95
Voted
FLAIRS
2003
15 years 3 months ago
Dispatching Cases versus Merging Case-Bases: When MCBR Matters
Multi-case-base reasoning (MCBR) extends case-based reasoning to draw on multiple case bases that may address somewhat different tasks. In MCBR, an agent selectively supplements i...
David B. Leake, Raja Sooriamurthi
LISA
2001
15 years 3 months ago
Macroscopic Internet Topology and Performance Measurements from the DNS Root Name Servers
We describe active measurements of topology and end-to-end latency characteristics between several of the DNS root servers and a subset of their clients using the skitter tool dev...
Marina Fomenkov, Kimberly C. Claffy, Bradley Huffa...
SCS
2001
15 years 3 months ago
Software Safety: Where's the Evidence?
Standards for safety critical software usually either mandate or recommend development and assessment techniques which are deemed appropriate to reduce the risk of flaws in the so...
John A. McDermid
IJCAI
2003
15 years 3 months ago
Gaussian Process Models of Spatial Aggregation Algorithms
Multi-level spatial aggregates are important for data mining in a variety of scientific and engineering applications, from analysis of weather data (aggregating temperature and p...
Naren Ramakrishnan, Christopher Bailey-Kellogg