Sciweavers

24680 search results - page 4446 / 4936
» Learning
Sort
View
IJIS
2008
123views more  IJIS 2008»
15 years 4 months ago
Algorithms of nonlinear document clustering based on fuzzy multiset model
Abstract: Fuzzy multiset is applicable as a model of information retrieval because it has the mathematical structure which expresses the number and the degree of attribution of an ...
Kiyotaka Mizutani, Ryo Inokuchi, Sadaaki Miyamoto
IJKL
2008
64views more  IJKL 2008»
15 years 4 months ago
Satellite-enabled educational services specification and requirements analysis based on user feedback
: Advanced tele-education services provision in remote geographically dispersed user communities (such as agriculture and maritime), based on the specific needs and requirements of...
Sofia Tsekeridou, Thanassis Tiropanis, Dimitris Ro...
IJMMS
2008
86views more  IJMMS 2008»
15 years 4 months ago
An empirical examination of factors contributing to the creation of successful e-learning environments
Although existing models of e-learning effectiveness in information systems (IS) have increased our understanding of how technology can support and enhance learning, most of our m...
Richard D. Johnson, Steven Hornik, Eduardo Salas
145
Voted
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 4 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 4 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
« Prev « First page 4446 / 4936 Last » Next »