Sciweavers

2176 search results - page 374 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
IDEAL
2009
Springer
15 years 29 days ago
Implementation and Integration of Algorithms into the KEEL Data-Mining Software Tool
This work is related to the KEEL1 (Knowledge Extraction based on Evolutionary Learning) tool, a non-commercial software that supports data management, design of experiments and an ...
Alberto Fernández, Julián Luengo, Jo...
IFIPTM
2009
163views Management» more  IFIPTM 2009»
15 years 29 days ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano
CSCW
2011
ACM
14 years 10 months ago
Research team integration: what it is and why it matters
Science policy across the world emphasizes the desirability of research teams that can integrate diverse perspectives and expertise into new knowledge, methods, and products. Howe...
Aruna D. Balakrishnan, Sara B. Kiesler, Jonathon N...
MTA
2011
260views Hardware» more  MTA 2011»
14 years 10 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 10 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi