Sciweavers

15754 search results - page 2947 / 3151
» Programs are Knowledge Bases
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 9 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
EDBT
2009
ACM
156views Database» more  EDBT 2009»
15 years 9 months ago
Efficient skyline retrieval with arbitrary similarity measures
A skyline query returns a set of objects that are not dominated by other objects. An object is said to dominate another if it is closer to the query than the latter on all factors...
Deepak P, Prasad M. Deshpande, Debapriyo Majumdar,...
EUROPAR
2009
Springer
15 years 9 months ago
Surfing Peer-to-Peer IPTV: Distributed Channel Switching
It is now common for IPTV systems attracting millions of users to be based on a peer-to-peer (P2P) architecture. In such systems, each channel is typically associated with one P2P ...
Anne-Marie Kermarrec, Erwan Le Merrer, Yaning Liu,...
ICAIL
2007
ACM
15 years 9 months ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
APCHI
2004
IEEE
15 years 9 months ago
Understanding Interaction Experience in Mobile Learning
The convergence of mobile technology and e-learning has generated considerable excitement among both practitioners and academics. Mass media continually promotes novel idea about m...
Fariza Hanis Abdul Razak
« Prev « First page 2947 / 3151 Last » Next »