Sciweavers

6826 search results - page 1222 / 1366
» Business Process Intelligence
Sort
View
AIS
2007
Springer
15 years 4 months ago
Wearable music in engaging technologies
We address the relationship between a music performer and her instrument as a possible model for re-thinking wearable technologies. Both musical instruments and textiles invite pa...
Franziska Schroeder, Pedro Rebelo
AI
2006
Springer
15 years 4 months ago
Generating and evaluating evaluative arguments
Evaluative arguments are pervasive in natural human communication. In countless situations people attempt to advise or persuade their interlocutors that something is desirable (vs...
Giuseppe Carenini, Johanna D. Moore
AI
2006
Springer
15 years 4 months ago
Backward-chaining evolutionary algorithms
Starting from some simple observations on a popular selection method in Evolutionary Algorithms (EAs)--tournament selection--we highlight a previously-unknown source of inefficien...
Riccardo Poli, William B. Langdon
CN
2007
168views more  CN 2007»
15 years 4 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
15 years 4 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
« Prev « First page 1222 / 1366 Last » Next »