Sciweavers

6087 search results - page 1124 / 1218
» Knowledge discovery methods
Sort
View
SIGCSE
1990
ACM
126views Education» more  SIGCSE 1990»
15 years 8 months ago
A philosophy and example of CS-1 programming projects
This paper presents a philosophy underlying CS-1 programming projects, and illustrates this philosophy with a concrete example. Integral to the philosophy is the use of Ada packag...
Richard E. Pattis
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 8 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
WCNC
2010
IEEE
15 years 8 months ago
Radio Resource Management in OFDMA-Based Cellular Networks Enhanced with Fixed and Nomadic Relays
—The provision of very high data rates in a ubiquitous manner throughout the service area is a great challenge for 4G and beyond-4G wireless networks. Towards that end, the deplo...
Mohamed Salem, Abdulkareem Adinoyi, Halim Yanikome...
ICAIL
2007
ACM
15 years 8 months ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
CIA
2006
Springer
15 years 7 months ago
Semantic Web Research Anno 2006: Main Streams, Popular Fallacies, Current Status and Future Challenges
In this topical1 paper we try to give an analysis and overview of the current state of Semantic Web research. We point to different interpretations of the Semantic Web as the reaso...
Frank van Harmelen
« Prev « First page 1124 / 1218 Last » Next »