Sciweavers

2741 search results - page 378 / 549
» Engineering Mathematical Knowledge
Sort
View
132
Voted
SECURWARE
2008
IEEE
15 years 11 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
AIMS
2008
Springer
15 years 11 months ago
An Architecture for Supporting Network Fault Recovery Management
Highly available and resilient networks play a decisive role in today’s networked world. As network faults are inevitable and networks are becoming constantly intricate, finding...
Feng Liu, Antonis M. Hadjiantonis, Ha Manh Tran, M...
IAT
2007
IEEE
15 years 11 months ago
Web Mining in the EVA Intelligent Agent Architecture
This paper describes the architecture of the fourth version of the Evolutionary Virtual Agent (EVA). This new light-weight java-based implementation is based on a dynamical rule-b...
Philippe Millet, Jean-Claude Heudin
128
Voted
CSR
2007
Springer
15 years 10 months ago
Estimation of the Click Volume by Large Scale Regression Analysis
Abstract. How could one estimate the total number of clicks a new advertisement could potentially receive in the current market? This question, called the click volume estimation p...
Yury Lifshits, Dirk Nowotka
131
Voted
ECTEL
2007
Springer
15 years 10 months ago
Resolving Variations in Learning Spaces for Experiential Learning
Today, systems should react based on explicit demands from the learner or even proactively react based on changes in the working environment. The success of this type of systems de...
Eric Ras