Sciweavers

693 search results - page 138 / 139
» Post-training support for learning technology
Sort
View
99
Voted
WSC
2004
14 years 11 months ago
"One" a New Tool for Supply Chain Network Optimization and Simulation
Nowadays, in a hotly competitive environment, companies are continuously trying to provide products and/or services to customers faster, cheaper, and better than the competitors d...
Hongwei Ding, Lyès Benyoucef, Xiaolan Xie, ...
AAAI
1994
14 years 10 months ago
Corpus-Driven Knowledge Acquisition for Discourse Analysis
The availability of large on-line text corpora provides a natural and promising bridge between the worlds of natural language processing (NLP) and machine learning (ML). In recent...
Stephen Soderland, Wendy G. Lehnert
ISI
2006
Springer
14 years 9 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
94
Voted
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 1 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
ICETE
2004
253views Business» more  ICETE 2004»
14 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong