Sciweavers

1486 search results - page 175 / 298
» Firewall Rules Analysis
Sort
View
ITS
1998
Springer
133views Multimedia» more  ITS 1998»
15 years 8 months ago
The Foundations and Architecture of Autotutor
The Tutoring Research Group at the University of Memphis is developing an intelligent tutoring system which takes advantages of recent technological advances in the areas of semant...
Peter M. Wiemer-Hastings, Arthur C. Graesser, Dere...
BIRTHDAY
2006
Springer
15 years 8 months ago
Verification by Parallelization of Parametric Code
Abstract. Loops and other unbound control structures constitute a major bottleneck in formal software verification, because correctness proofs over such control structures generall...
Tobias Gedell, Reiner Hähnle
PODS
1991
ACM
131views Database» more  PODS 1991»
15 years 8 months ago
Termination Detection in Logic Programs using Argument Sizes
d Abstract Kirack Sohn and Allen Van Gelder University of California, Santa Cruz Progress on automated termination detection for logic programs is reported. The prospects for han...
Kirack Sohn, Allen Van Gelder
CCECE
2009
IEEE
15 years 7 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
AUSDM
2008
Springer
258views Data Mining» more  AUSDM 2008»
15 years 6 months ago
wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability
Accurate and less invasive personalized predictive medicine can spare many breast cancer patients from receiving complex surgical biopsies, unnecessary adjuvant treatments and its...
Umer Khan, Hyunjung Shin, Jongpill Choi, Minkoo Ki...