Sciweavers

13841 search results - page 2587 / 2769
» Algorithms and Constraint Programming
Sort
View
136
Voted
IEAAIE
2004
Springer
15 years 8 months ago
Machine Learning Approaches for Inducing Student Models
The main issue in e-learning is student modelling, i.e. the analysis of a student’s behaviour and prediction of his/her future behaviour and learning performance. Indeed, it is d...
Oriana Licchelli, Teresa Maria Altomare Basile, Ni...
IFIP
2004
Springer
15 years 8 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
127
Voted
IFIP
2004
Springer
15 years 8 months ago
Imperfectness of Data for STS-Based Physical Mapping
In the STS-based mapping, we are requested to obtain the correct order of probes in a DNA sequence from a given set of fragments or equivalently a hybridization matrix A. It is wel...
Hiro Ito, Kazuo Iwama, Takeyuki Tamura
128
Voted
ISER
2004
Springer
115views Robotics» more  ISER 2004»
15 years 8 months ago
Dynamic Virtual Fences for Controlling Cows
A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
ISSAC
2004
Springer
185views Mathematics» more  ISSAC 2004»
15 years 8 months ago
Automatic generation of polynomial loop
In [17], an abstract framework for automatically generating loop invariants of imperative programs was proposed. This framework was then instantiated for the language of conjuncti...
Enric Rodríguez-Carbonell, Deepak Kapur
« Prev « First page 2587 / 2769 Last » Next »