Sciweavers

51 search results - page 10 / 11
» Forensic course development: one year later
Sort
View
WISE
2010
Springer
14 years 7 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
WWW
2006
ACM
15 years 10 months ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
ELPUB
2006
ACM
15 years 3 months ago
The Text Encoding Initiative Anno 2005: An Orientation and Workshop
The Text Encoding Initiative is an international and interdisciplinary standards project established in 1987 to develop, maintain and promulgate hardware- and software-independent...
Lou Burnard, Matthew Driscoll
FP
1989
124views Formal Methods» more  FP 1989»
15 years 1 months ago
Deriving the Fast Fourier Algorithm by Calculation
This paper reports an explanation of an intricate algorithm in the terms of a potentially mechanisable rigorous-development method. It uses notations and techniques of Sheeran 1] ...
Geraint Jones
SOCRATES
2008
133views Education» more  SOCRATES 2008»
14 years 11 months ago
From Daily Language to Scientific Jargon: The Role of Peer Interaction in Web Forum
The paper presents the activities and the results of the "Child Observation in school context workshop", an on line course realized during the last academic years at Mac...
P. Nicolini, T. Lapucci