Sciweavers

651 search results - page 101 / 131
» Decisions in thesaurus construction and use
Sort
View
ISI
2006
Springer
14 years 11 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
CCE
2005
14 years 11 months ago
Logic-based outer approximation for globally optimal synthesis of process networks
Process network problems can be formulated as Generalized Disjunctive Programs where a logicbased representation is used to deal with the discrete and continuous decisions. A new ...
María Lorena Bergamini, Pío A. Aguir...
UMUAI
2008
110views more  UMUAI 2008»
14 years 11 months ago
Modeling self-efficacy in intelligent tutoring systems: An inductive approach
Abstract. Self-efficacy is an individual's belief about her ability to perform well in a given situation. Because selfefficacious students are effective learners, endowing int...
Scott W. McQuiggan, Bradford W. Mott, James C. Les...
AR
2002
157views more  AR 2002»
14 years 11 months ago
Acquiring state from control dynamics to learn grasping policies for robot hands
Abstract--A prominent emerging theory of sensorimotor development in biological systems proposes that control knowledge is encoded in the dynamics of physical interaction with the ...
Roderic A. Grupen, Jefferson A. Coelho Jr.
FSTTCS
2010
Springer
14 years 9 months ago
Parityizing Rabin and Streett
The parity acceptance condition for -regular languages is a special case of the Rabin and Streett acceptance conditions. While the parity acceptance condition is as expressive as ...
Udi Boker, Orna Kupferman, Avital Steinitz