Sciweavers

6833 search results - page 1288 / 1367
» Some two-character sets
Sort
View
ISMIR
2000
Springer
190views Music» more  ISMIR 2000»
15 years 1 months ago
Music IR: Past, Present, and Future
Music Information Retrieval has a longer history than most people realise, with systems developed in the 1960's. The field has its roots in information retrieval, musicology ...
Alexandra L. Uitdenbogerd
KBSE
2000
IEEE
15 years 1 months ago
Simultaneous Checking of Completeness and Ground Confluence
c specifications provide a powerful method for the specification of abstract data types in programming languages and software systems. Completeness and ground confluence are fundam...
Adel Bouhoula
NDSS
2000
IEEE
15 years 1 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
RSCTC
2000
Springer
185views Fuzzy Logic» more  RSCTC 2000»
15 years 1 months ago
A Comparison of Several Approaches to Missing Attribute Values in Data Mining
: In the paper nine different approaches to missing attribute values are presented and compared. Ten input data files were used to investigate the performance of the nine methods t...
Jerzy W. Grzymala-Busse, Ming Hu
SIGUCCS
2000
ACM
15 years 1 months ago
Approaches to Computer Lab Management: Lockdown vs. Freedom
Basic approaches to computer lab management range along a spectrum from total lockdown of lab computers to total freedom. Total lockdown, which can be implemented with system perm...
Christopher Jones, Yasemin Tunc, Deborah Cherry
« Prev « First page 1288 / 1367 Last » Next »