Sciweavers

1486 search results - page 190 / 298
» Firewall Rules Analysis
Sort
View
132
Voted
AI
2005
Springer
15 years 9 months ago
Generating Adaptive Multimedia Presentations Based on a Semiotic Framework
Abstract. We propose a framework for generating adaptive multimedia presentations through the dynamic selection of files from a large data repository. The presentation is generate...
Osama El Demerdash, Sabine Bergler, Leila Kosseim,...
DIGRA
2005
Springer
15 years 9 months ago
Gaining Advantage: How Videogame Players Define and Negotiate Cheating
This paper addresses players’ uses of supplemental items during gameplay, how they define what is and is not “cheating” in reference to these items, and then, what actions t...
Mia Consalvo
128
Voted
EUC
2005
Springer
15 years 9 months ago
Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing
Advanced analysis of data for extracting useful knowledge is the next natural step in the world of ubiquitous computing. So far, most of the ubiquitous systems process knowledge in...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
RSFDGRC
2005
Springer
134views Data Mining» more  RSFDGRC 2005»
15 years 9 months ago
The Computational Complexity of Inference Using Rough Set Flow Graphs
Pawlak recently introduced rough set flow graphs (RSFGs) as a graphical framework for reasoning from data. Each rule is associated with three coefficients, which have been shown t...
Cory J. Butz, Wen Yan, Boting Yang
ICFCA
2004
Springer
15 years 9 months ago
Background Knowledge in Concept Graphs
Traditional logic can be understood as the investigation of the three main essential functions of thinking – concepts, judgements and conclusions. In the last years, in a new res...
Frithjof Dau