Sciweavers

3787 search results - page 656 / 758
» The Use of Agents Techniques on Intelligent Tutoring Systems
Sort
View
101
Voted
DRM
2004
Springer
15 years 7 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
KDD
2008
ACM
121views Data Mining» more  KDD 2008»
16 years 2 months ago
Reconstructing chemical reaction networks: data mining meets system identification
We present an approach to reconstructing chemical reaction networks from time series measurements of the concentrations of the molecules involved. Our solution strategy combines t...
Yong Ju Cho, Naren Ramakrishnan, Yang Cao
ADVIS
2006
Springer
15 years 7 months ago
Integrated Expert Management Knowledge on OSI Network Management Objects
Abstract. The management of modern telecommunications networks must satisfy ever-increasing operational demands. We propose a study for the improvement of intelligent administratio...
Antonio Martín, Carlos León, F&eacut...
AH
2000
Springer
15 years 6 months ago
Providing Tailored (Context-Aware) Information to City Visitors
The GUIDE system has been developed in order to provide city visitors with an intelligent and context-aware tourist guide. The system has been deployed in the city of Lancaster an...
Keith Cheverst, Nigel Davies, Keith Mitchell, Paul...
87
Voted
CSL
2009
Springer
15 years 8 months ago
On the Relation between Sized-Types Based Termination and Semantic Labelling
We investigate the relationship between two independently developed termination techniques for rst and higher-order rewrite systems. On the one hand, sized-types based termination...
Frédéric Blanqui, Cody Roux