Sciweavers

328 search results - page 40 / 66
» Requirements Inheritance in Continuous Requirements Engineer...
Sort
View
89
Voted
AIEDU
2007
101views more  AIEDU 2007»
14 years 10 months ago
Evaluating the Effect of Open Student Models on Self-Assessment
Abstract. This paper discusses the simple open student models used in two of our constraint-based tutors, SQLd KERMIT, and their effects on self-assessment. The systems present a h...
Antonija Mitrovic, Brent Martin
JSAC
2010
122views more  JSAC 2010»
14 years 9 months ago
Scalable service migration in autonomic network environments
Abstract— Service placement is a key problem in communication networks as it determines how efficiently the user service demands are supported. This problem has been traditional...
Konstantinos Oikonomou, Ioannis Stavrakakis
68
Voted
IPMI
2007
Springer
15 years 11 months ago
Multi-fiber Reconstruction from Diffusion MRI Using Mixture of Wisharts and Sparse Deconvolution
Abstract. In this paper, we present a novel continuous mixture of diffusion tensors model for the diffusion-weighted MR signal attenuation. The relationship between the mixing dist...
Bing Jian, Baba C. Vemuri
ICANN
2007
Springer
15 years 5 months ago
Biasing Neural Networks Towards Exploration or Exploitation Using Neuromodulation
Abstract. Taking neuromodulation as a mechanism underlying emotions, this paper investigates how such a mechanism can bias an artificial neural network towards exploration of new ...
Karla Parussel, Lola Cañamero
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 5 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...