Sciweavers

2095 search results - page 333 / 419
» Describing Groups
Sort
View
ICMLA
2004
15 years 6 months ago
Mining interesting contrast rules for a web-based educational system
Web-based educational technologies allow educators to study how students learn (descriptive studies) and which learning strategies are most effective (causal/predictive studies). ...
Behrouz Minaei-Bidgoli, Pang-Ning Tan, William F. ...
ESANN
2001
15 years 6 months ago
An integrated neural IR system
Over the years the amount and range of electronic text stored on the WWW has expanded rapidly, overwhelming both users and tools designed to index and search the information. It is...
Victoria J. Hodge, Jim Austin
130
Voted
LISA
2004
15 years 6 months ago
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensur...
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron...
ECIS
2003
15 years 6 months ago
A qualitative approach to investigating the behavioural definitions of the four-paradigm theory of information systems developme
Hirschheim, Klein and Lyytinen introduced the four-paradigm theory of information systems development (ISD) as a significant attempt to systematise developer assumptions. The theo...
Donal J. Flynn, Zahid I. Hussain
FORTE
2003
15 years 6 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson