Sciweavers

328 search results - page 40 / 66
» Requirements Inheritance in Continuous Requirements Engineer...
Sort
View
105
Voted
AIEDU
2007
101views more  AIEDU 2007»
15 years 9 days ago
Evaluating the Effect of Open Student Models on Self-Assessment
Abstract. This paper discusses the simple open student models used in two of our constraint-based tutors, SQLd KERMIT, and their effects on self-assessment. The systems present a h...
Antonija Mitrovic, Brent Martin
124
Voted
JSAC
2010
122views more  JSAC 2010»
14 years 11 months ago
Scalable service migration in autonomic network environments
Abstract— Service placement is a key problem in communication networks as it determines how efficiently the user service demands are supported. This problem has been traditional...
Konstantinos Oikonomou, Ioannis Stavrakakis
IPMI
2007
Springer
16 years 1 months ago
Multi-fiber Reconstruction from Diffusion MRI Using Mixture of Wisharts and Sparse Deconvolution
Abstract. In this paper, we present a novel continuous mixture of diffusion tensors model for the diffusion-weighted MR signal attenuation. The relationship between the mixing dist...
Bing Jian, Baba C. Vemuri
ICANN
2007
Springer
15 years 6 months ago
Biasing Neural Networks Towards Exploration or Exploitation Using Neuromodulation
Abstract. Taking neuromodulation as a mechanism underlying emotions, this paper investigates how such a mechanism can bias an artificial neural network towards exploration of new ...
Karla Parussel, Lola Cañamero
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 6 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...