Sciweavers

456 search results - page 9 / 92
» Qualitative System Identification from Imperfect Data
Sort
View
EUC
2008
Springer
14 years 11 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
EDM
2010
152views Data Mining» more  EDM 2010»
14 years 11 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim
TSP
2010
14 years 4 months ago
A continuous-time linear system identification method for slowly sampled data
Both direct and indirect methods exist for identifying continuous-time linear systems. A direct method estimates continuous-time input and output signals from their samples and the...
Damián Marelli, Minyue Fu
IWPC
1996
IEEE
15 years 1 months ago
Extracting Business Rules from Source Code
This paper reviews the state of the art on application knowledge acquisiton from existing software systems and defines the role of business rules. It then goes on to present a met...
Harry M. Sneed, Katalin Erdös
GIS
1995
ACM
15 years 1 months ago
Collaborative Spatial Decision Making with Qualitative Constraints
: Usually spatial planning problems involve a large number of decision makers with different backgrounds and interests. The process of Collaborative Spatial Decision Making (CSDM)...
Nikos I. Karacapilidis, Dimitris Papadias, Max J. ...