Sciweavers

5896 search results - page 1014 / 1180
» On Learning with Integral Operators
Sort
View
111
Voted
WIKIS
2005
ACM
15 years 9 months ago
Wikis in teaching and assessment: the M/Cyclopedia project
In a knowledge-based, networked economy, students leaving university need to have attained skills in collaborative and creative project-based work and to have developed critical, ...
Axel Bruns, Sal Humphreys
125
Voted
APWEB
2005
Springer
15 years 9 months ago
Mining Quantitative Associations in Large Database
Association Rule Mining algorithms operate on a data matrix to derive association rule, discarding the quantities of the items, which contains valuable information. In order to mak...
Chenyong Hu, Yongji Wang, Benyu Zhang, Qiang Yang,...
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 9 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
138
Voted
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
15 years 9 months ago
A genetic algorithm for unmanned aerial vehicle routing
Genetic Algorithms (GAs) can efficiently produce high quality results for hard combinatorial real world problems such as the Vehicle Routing Problem (VRP). Genetic Vehicle Represe...
Matthew A. Russell, Gary B. Lamont
140
Voted
ISMIS
2005
Springer
15 years 9 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
« Prev « First page 1014 / 1180 Last » Next »