Sciweavers

2111 search results - page 252 / 423
» How to Program Pervasive Systems
Sort
View
113
Voted
ISSAC
2007
Springer
111views Mathematics» more  ISSAC 2007»
15 years 9 months ago
Numerical optimization in hybrid symbolic-numeric computation
Approximate symbolic computation problems can be formulated as constrained or unconstrained optimization problems, for example: GCD [3, 8, 12, 13, 23], factorization [5, 10], and ...
Lihong Zhi
102
Voted
UM
2005
Springer
15 years 9 months ago
Exploring Eye Tracking to Increase Bandwidth in User Modeling
The accuracy of a user model usually depends on the amount and quality of information available on the user’s states of interest. An eye-tracker provides data detailing where a u...
Cristina Conati, Christina Merten, Kasia Muldner, ...
140
Voted
XSYM
2005
Springer
107views Database» more  XSYM 2005»
15 years 9 months ago
Logic Wrappers and XSLT Transformations for Tuples Extraction from HTML
Abstract. Recently it was shown that existing general-purpose inductive logic programming systems are useful for learning wrappers (known as L-wrappers) to extract data from HTML d...
Costin Badica, Amelia Badica
108
Voted
SIGUCCS
2004
ACM
15 years 9 months ago
Walking the tightrope of faculty support
Determining the desired relationship between IT professionals and faculty is an important step in setting expectations and developing programs to achieve that relationship. Two co...
Kelly Wainwright, Bruce Arnold
148
Voted
ASP
2001
Springer
15 years 8 months ago
Genes and Ants for Default Logic
Default Logic and Logic Programming with stable model semantics are recognized as powerful frameworks for incomplete information representation. Their expressive power are suitabl...
Pascal Nicolas, Frédéric Saubion, Ig...