Sciweavers

411 search results - page 60 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
AIED
2007
Springer
15 years 4 months ago
How did the e-learning session go? The Student Inspector
Good teachers know their students, and exploit this knowledge to adapt or optimise their instruction. Traditional teachers know their students because they interact with them face-...
Oliver Scheuer, Claus Zinn
MIS
2008
Springer
149views Multimedia» more  MIS 2008»
14 years 10 months ago
Home-Explorer: Ontology-based physical artifact search and hidden object detection system
A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses s...
Bin Guo, Satoru Satake, Michita Imai
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 10 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
MUC
1991
15 years 1 months ago
University of Massachusetts: description of the CIRCUS system as used for MUC-3
ind this work was to extract a relatively abstract level of information from each sentence , using only a limited vocabulary that was hand-crafted to handle a restricted set of tar...
Wendy G. Lehnert, Claire Cardie, David Fisher, Ell...
VLDB
1999
ACM
140views Database» more  VLDB 1999»
15 years 2 months ago
Distributed Hypertext Resource Discovery Through Examples
We describe the architecture of a hypertext resource discovery system using a relational database. Such a system can answer questions that combine page contents, metadata, and hyp...
Soumen Chakrabarti, Martin van den Berg, Byron Dom