Sciweavers

1094 search results - page 143 / 219
» On Computing Explanations in Argumentation
Sort
View
DIMVA
2008
15 years 15 days ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
FECS
2006
100views Education» more  FECS 2006»
15 years 14 days ago
Pair Programming: Not for Everyone?
- Developments in CS1 pedagogy seek to improve the capabilities of students in their understanding of how to write programs. This involves learning how to solve various types of pr...
Jacob P. Somervell
IIS
2003
15 years 13 days ago
Ontology-based Text Document Clustering
Text clustering typically involves clustering in a high dimensional space, which appears difficult with regard to virtually all practical settings. In addition, given a particular...
Steffen Staab, Andreas Hotho
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 11 months ago
Catching the Ouroboros: On Debugging Non-ground Answer-Set Programs
An important issue towards a broader acceptance of answer-set programming (ASP) is the deployment of tools which support the programmer during the coding phase. In particular, met...
Johannes Oetsch, Jörg Pührer, Hans Tompi...
AI
2006
Springer
14 years 11 months ago
Controlled generation of hard and easy Bayesian networks: Impact on maximal clique size in tree clustering
This article presents and analyzes algorithms that systematically generate random Bayesian networks of varying difficulty levels, with respect to inference using tree clustering. ...
Ole J. Mengshoel, David C. Wilkins, Dan Roth