Sciweavers

704 search results - page 128 / 141
» Exploiting Data Missingness in Bayesian Network Modeling
Sort
View
TSMC
2002
134views more  TSMC 2002»
14 years 10 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
101
Voted
AUSDM
2007
Springer
185views Data Mining» more  AUSDM 2007»
15 years 5 months ago
An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario
Argumentation allows agents to exchange additional information to argue about their beliefs and other mental attitudes during the negotiation process. Utterances and subsequent obs...
Khandaker Shahidul Islam
90
Voted
QEST
2005
IEEE
15 years 4 months ago
Toward Picture-perfect Streaming on the Internet
Quality of service (QoS) in streaming of continuous media over the Internet is poor, which is partly due to variations in delays, bandwidth limitations, and packet losses. Althoug...
Alix L. H. Chow, Leana Golubchik, John C. S. Lui
82
Voted
WETICE
1997
IEEE
15 years 3 months ago
Boundaries, Awareness and Interaction in Collaborative Virtual Environments
This paper is concerned with how collaborative virtual environments can be structured in order to enable greater scalability and yet maintain a richness of communication. Based on...
Chris Greenhalgh, Steve Benford
COMAD
2009
14 years 12 months ago
Querying for relations from the semi-structured Web
We present a class of web queries whose result is a multi-column relation instead of a collection of unstructured documents as in standard web search. The user specifies the query...
Sunita Sarawagi