Sciweavers

1837 search results - page 346 / 368
» Learning From Ambiguous Examples
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
15 years 6 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
I3
2007
15 years 3 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
GG
2008
Springer
15 years 3 months ago
Graph-Based Tools: The Contest
This event is the second instance of the contest for graph transformation-based tools, which was first held as part of the AGTIVE workshop. The aim is to stimulate tool developmen...
Arend Rensink, Pieter Van Gorp
BMCBI
2010
170views more  BMCBI 2010»
15 years 2 months ago
Analysis of lifestyle and metabolic predictors of visceral obesity with Bayesian Networks
Background: The aim of this study was to provide a framework for the analysis of visceral obesity and its determinants in women, where complex inter-relationships are observed amo...
Alex Aussem, André Tchernof, Sergio Rodrigu...
126
Voted
CE
2007
176views more  CE 2007»
15 years 2 months ago
Pedagogical approaches for technology-integrated science teaching
The two separate projects described have examined how teachers exploit computer-based technologies in supporting learning of science at secondary level. This paper examines how pe...
Sara Hennessy, Jocelyn Wishart, Denise Whitelock, ...