Sciweavers

9425 search results - page 1723 / 1885
» Some Notes on Models and Modelling
Sort
View
ACSAC
2004
IEEE
15 years 5 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
HPCN
2000
Springer
15 years 5 months ago
A Java-Based Parallel Programming Support Environment
The Java programming language and environment is stimulating new research activities in many areas of computing, not the least of which is parallel computing. Parallel techniques ...
Kenneth A. Hawick, Heath A. James
CP
2008
Springer
15 years 3 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
ELPUB
2008
ACM
15 years 3 months ago
A review of journal policies for sharing research data
Background: Sharing data is a tenet of science, yet commonplace in only a few subdisciplines. Recognizing that a data sharing culture is unlikely to be achieved without policy gui...
Heather A. Piwowar, Wendy Webber Chapman
CLIMA
2004
15 years 3 months ago
A New Framework for Knowledge Revision of Abductive Agents Through Their Interaction
The aim of this work is the design of a framework for the revision of knowledge in abductive reasoning agents, based on interaction. We address issues such as: how to exploit knowl...
Andrea Bracciali, Paolo Torroni
« Prev « First page 1723 / 1885 Last » Next »